Sciweavers

3482 search results - page 10 / 697
» Designing for security
Sort
View
SP
2008
IEEE
127views Security Privacy» more  SP 2008»
14 years 3 months ago
Civitas: Toward a Secure Voting System
Civitas is the first electronic voting system that is coercion-resistant, universally and voter verifiable, and suitable for remote voting. This paper describes the design and i...
Michael R. Clarkson, Stephen Chong, Andrew C. Myer...
CAISE
2003
Springer
14 years 2 months ago
A Methodology for Multilevel Database Design
Abstract. In a Connected Society, the importance of database privacy and security increases considerably. Security must be considered as a fundamental requirement in Information Sy...
Eduardo Fernández-Medina, Mario Piattini
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
14 years 1 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 2 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
CCS
2004
ACM
14 years 2 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers