Sciweavers

626 search results - page 74 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
JAISE
2010
169views Algorithms» more  JAISE 2010»
13 years 2 months ago
Responsive environments: User experiences for ambient intelligence
In this paper we review the emerging field of responsive environments as an ambient intelligence system with a focus on user experience. We see responsive environments as a combina...
Jorge Alves Lino, Benjamin Salem, Matthias Rauterb...
SIGOPSE
1994
ACM
13 years 11 months ago
New Directions for Integrated Circuit Cards Operating Systems
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Pierre Paradinas, Jean-Jacques Vandewalle
IEEEARES
2007
IEEE
14 years 2 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
SACMAT
2006
ACM
14 years 1 months ago
Constraint generation for separation of duty
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
Hong Chen, Ninghui Li