Sciweavers

2403 search results - page 4 / 481
» Cyberinsurance in IT Security Management
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 1 months ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...
CCS
2001
ACM
14 years 13 days ago
Privacy Engineering for Digital Rights Management Systems
Joan Feigenbaum, Michael J. Freedman, Tomas Sander...
CCS
2001
ACM
14 years 13 days ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...
ACSAC
1999
IEEE
14 years 7 days ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin