Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
Business Processes for Web Services are the new paradigm for the lightweight integration of business from diļ¬erent enterprises. Whereas the security and access control policies ...
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...