Sciweavers

199 search results - page 19 / 40
» Towards an Integrated Conceptual Model of Security and Depen...
Sort
View
50
Voted
APBC
2003
14 years 11 months ago
Towards Transparent Access to Multiple Biological Databanks
Nowadays, biologists use a number of large biological databanks to find relevant information for their research. Users of these databanks face a number of problems. One problem i...
Patrick Lambrix, Vaida Jakoniene
ACISP
2009
Springer
15 years 4 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu
CCS
2010
ACM
15 years 4 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
88
Voted
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 1 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
83
Voted
HICSS
2003
IEEE
109views Biometrics» more  HICSS 2003»
15 years 2 months ago
Towards a Structurational Theory of Information Systems: A Substantive Case Analysis
This paper employs the analysis of an interpretive case study within a Regional Train Operating Company (RTOC) to arrive at theoretical understandings of Information Systems (IS)....
Jeremy Rose, Ray Hackney