Sciweavers

1605 search results - page 233 / 321
» E-commerce Security Issues
Sort
View
190
Voted
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 6 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
CONEXT
2007
ACM
15 years 5 months ago
A next generation internet architecture for mobility and multi-homing support
The current internetworking architecture presents some limitations to naturally support mobility and multi-homing. Among the limitations, the IP semantic overload seems to be a pr...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
BCSHCI
2008
15 years 5 months ago
Ubiquitous healthcare: do we want it?
In this paper we describe the development and test of a futuristic health scenario that allows the seamless exchange of sensitive personal data. The scenario was used to elicit us...
Linda Little, Pamela Briggs
BIS
2008
86views Business» more  BIS 2008»
15 years 5 months ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck
DBSEC
2007
89views Database» more  DBSEC 2007»
15 years 5 months ago
Design and Analysis of Querying Encrypted Data in Relational Databases
Security and privacy concerns as well as legal considerations force many companies to encrypt the sensitive data in databases. However, storing the data in an encrypted format enta...
Mustafa Canim, Murat Kantarcioglu