Sciweavers

2337 search results - page 87 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
CCS
2004
ACM
15 years 3 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
ITNG
2006
IEEE
15 years 4 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...
CCS
2010
ACM
14 years 10 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
DAC
1995
ACM
15 years 1 months ago
The Case for Design Using the World Wide Web
— Most information and services required today by designers will soon become available as documents distributed in a wide area hypermedia network. New integration services are re...
Mário J. Silva, Randy H. Katz
IAJIT
2010
133views more  IAJIT 2010»
14 years 8 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa