Sciweavers

3482 search results - page 89 / 697
» Designing for security
Sort
View
CHI
2005
ACM
14 years 9 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
CAISE
2009
Springer
14 years 3 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
IPSN
2007
Springer
14 years 3 months ago
MiniSec: a secure sensor network communication architecture
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protoco...
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. ...
DRM
2004
Springer
14 years 2 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
ACSAC
1997
IEEE
14 years 1 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford