Sciweavers

1347 search results - page 106 / 270
» Towards a Secure Data Stream Management System
Sort
View
IEEEARES
2010
IEEE
15 years 11 months ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
AISS
2010
165views more  AISS 2010»
15 years 1 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
ECIS
2003
15 years 5 months ago
Towards a stakeholder analysis of information systems development project abandonment
This study adopts a stakeholder analysis to examine stakeholders’ roles and contributions in influencing organizational decisions to abandon information systems (IS) development...
Gary S. C. Pan, Donal J. Flynn
CCS
2010
ACM
15 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...