Sciweavers

626 search results - page 20 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
IDTRUST
2010
ACM
14 years 3 months ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....
PLDI
2006
ACM
14 years 4 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 4 months ago
Electronic Markets for Private Information: Economic and Security Considerations
Technological advances in the collection, storage and analysis of data have increased the ease with which businesses can make profitable use of information about individuals. Som...
Ram Gopal L., Robert S. Garfinkel, Manuel A. Nunez...
DL
2000
Springer
169views Digital Library» more  DL 2000»
14 years 2 months ago
Asynchronous information space analysis architecture using content and structure-based service brokering
Our project focuses on rapid formation and utilization of custom collections of information for groups focused on high-paced tasks. Assembling such collections, as well as organiz...
Ke-Thia Yao, In-Young Ko, Ragy Eleish, Robert Nech...
CSFW
2003
IEEE
14 years 3 months ago
Anonymity and Information Hiding in Multiagent Systems
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal l...
Joseph Y. Halpern, Kevin R. O'Neill