Sciweavers

224 search results - page 25 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
SIGUCCS
2003
ACM
14 years 1 months ago
The SNet model: access, security and e-services for students
This paper will explore the SNet model that Hunter College of the City University of New York developed and implemented. During the Spring of 2002, CUNY as a central organization ...
Anand Padmanabhan
OOPSLA
2004
Springer
14 years 1 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman
IWCMC
2006
ACM
14 years 1 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
23
Voted
TOIT
2008
92views more  TOIT 2008»
13 years 7 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara