Sciweavers

2337 search results - page 96 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 4 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
ECOOPW
1999
Springer
15 years 2 months ago
Security in Active Networks
The desire for exible networking services has given rise to the concept of active networks." Active networks provide a general framework for designing and implementing network...
D. Scott Alexander, William A. Arbaugh, Angelos D....
VL
2005
IEEE
137views Visual Languages» more  VL 2005»
15 years 3 months ago
CAM: A Mobile Paper-Based Information Services Architecture for Remote Rural Areas in the Developing World
During our work with microfinance groups in rural India, we found that paper plays a crucial role in many local information practices. However, paperbased record keeping can be in...
Tapan S. Parikh
AAAI
1997
14 years 11 months ago
DISXPERT: A Social Security Disability Screening Expert System
This case study paper reports on the development and implementation of DISXPERT, a rule-based expert system tool for referral of social security disability recipients to vocationa...
James R. Nolan
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo