Sciweavers

97 search results - page 14 / 20
» Beyond Just Data Privacy
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
IEEEARES
2007
IEEE
14 years 2 months ago
Applying a Tradeoff Model (TOM) to TACT
In a software system, it is inevitable that components will occasionally fail to produce acceptable results and become unavailable to serve its clients. Replication is the techniq...
Raihan Al-Ekram, Richard C. Holt, Chris Hobbs
EUROPKI
2007
Springer
14 years 2 months ago
AutoPKI: A PKI Resources Discovery System
The central goal of Public Key Infrastructure (PKI) is to enable trust judgments between distributed users. Although certificates play a central role in making such judgments, a P...
Massimiliano Pala, Sean W. Smith
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 1 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
ACSAC
2004
IEEE
13 years 11 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...