Sciweavers

5119 search results - page 47 / 1024
» Security Privacy
Sort
View
98
Voted
CCS
2000
ACM
15 years 8 months ago
An access control model for simplifying constraint expression
Jonathon Tidswell, Trent Jaeger
118
Voted
IEEEARES
2010
IEEE
15 years 8 months ago
Formal Specification and Analysis of an E-voting System
Komminist Weldemariam, Richard A. Kemmerer, Adolfo...
102
Voted
ACSAC
1999
IEEE
15 years 8 months ago
The ARBAC99 Model for Administration of Roles
Ravi S. Sandhu, Qamar Munawer
94
Voted
ACISP
1999
Springer
15 years 8 months ago
Generalised Cycling Attacks on RSA and Strong RSA Primes
Marc Gysin, Jennifer Seberry
89
Voted
ACISP
1999
Springer
15 years 8 months ago
Companion Viruses and the Macintosh: Threats and Countermeasures
Jeffrey Horton, Jennifer Seberry