Sciweavers

436 search results - page 41 / 88
» Using trust assumptions with security requirements
Sort
View
ICCCN
1998
IEEE
15 years 8 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 7 months ago
Towards a Generic Process for Security Pattern Integration
Abstract--Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting ...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
131
Voted
I3E
2001
126views Business» more  I3E 2001»
15 years 5 months ago
Symbolon - A Novel Concept For Secure e-Commerce
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated secur...
Sebastian Fischmeister, Günther Hagleitner, W...
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 5 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
15 years 10 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...