Sciweavers

1140 search results - page 144 / 228
» A Purpose-Based Access Control Model
Sort
View
ISW
1997
Springer
14 years 2 days ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
14 years 1 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier
SIGOPSE
2004
ACM
14 years 1 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
CAISE
2003
Springer
14 years 1 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
13 years 9 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung