Sciweavers

635 search results - page 74 / 127
» Social Aspects of Information Security
Sort
View
CHI
2008
ACM
16 years 7 days ago
Informatics at UC Irvine
Computer Science, as a single discipline, can no longer speak to the broad relevance of digital technologies in society. The Department of Informatics in the Donald Bren School of...
Paul Dourish, Gillian R. Hayes, Lilly Irani, Charl...
NTMS
2009
IEEE
15 years 6 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 11 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
ICDCS
2010
IEEE
15 years 3 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
TITB
2008
204views more  TITB 2008»
14 years 11 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...