Sciweavers

224 search results - page 16 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
CCS
2010
ACM
13 years 2 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
EEE
2004
IEEE
13 years 11 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
APWEB
2008
Springer
13 years 9 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang