Sciweavers

349 search results - page 26 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
CCS
2009
ACM
14 years 9 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
ACSAC
1999
IEEE
14 years 28 days ago
Modular Fair Exchange Protocols for Electronic Commerce
Recently, research has focused on enabling fair exchange between payment and electronically shipped items. The reason for this is the growing importance of Electronic Commerce and...
Holger Vogt, Henning Pagnia, Felix C. Gärtner
SEC
2007
13 years 10 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
ICPADS
2006
IEEE
14 years 2 months ago
Experiences with Simulations - A Light and Fast Model for Secure Web Applications
Using simulations of a complex system such as a Web Application Server provides us with a tool that allows the running of tests without using the resources needed in a real system...
Ramon Nou, Jordi Guitart, David Carrera, Jordi Tor...
ICDCS
2008
IEEE
14 years 3 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou