Sciweavers

18697 search results - page 173 / 3740
» Systemic Security Management
Sort
View
SRDS
2010
IEEE
15 years 2 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
WS
2005
ACM
15 years 10 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
118
Voted
ISSA
2004
15 years 6 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 11 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
153
Voted
JTAER
2010
109views more  JTAER 2010»
15 years 3 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...