Sciweavers

2358 search results - page 132 / 472
» A Secure Pervasive Environment
Sort
View
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
14 years 3 months ago
Exploring the Suitability of IS Security Management Standards for SMEs
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standa...
Yves Barlette, Vladislav Fomin
EEE
2004
IEEE
14 years 24 days ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
JTAER
2006
100views more  JTAER 2006»
13 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
EH
2002
IEEE
108views Hardware» more  EH 2002»
14 years 2 months ago
We Need Assurance
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersâ...
Brian D. Snow
SWS
2004
ACM
14 years 2 months ago
Ticket-based fine-grained authorization service in the dynamic VO environment
Virtual Organization (VO) is a collection of users and distributed resources, in which resources are shared by users. Creating VOs is very important task in Grid computing. VOs ar...
Byung Joon Kim, Sung Je Hong, Jong Kim