Sciweavers

384 search results - page 46 / 77
» A Survey of Watermarking Security
Sort
View
BWCCA
2010
13 years 2 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang
IEEEARES
2007
IEEE
14 years 1 months ago
Revisiting Hot Passive Replication
Passive replication has been extensively studied in the literature. However, there is no comprehensive study yet with regard to its degree of communication synchrony. Therefore, w...
Rubén de Juan-Marín, Hendrik Decker,...
WETICE
2006
IEEE
14 years 1 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
ICOIN
2005
Springer
14 years 1 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
LICS
2003
IEEE
14 years 27 days ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi