Sciweavers

949 search results - page 41 / 190
» Design methods for security and trust
Sort
View
IS
2007
13 years 7 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ASIACRYPT
2000
Springer
14 years 9 days ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
CHI
2002
ACM
14 years 8 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
14 years 1 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu