Sciweavers

536 search results - page 22 / 108
» Embedding Information Security into the Organization
Sort
View
ACSAC
2010
IEEE
12 years 12 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
EGOV
2005
Springer
14 years 1 months ago
An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone
In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
LISA
2008
13 years 10 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
WSNA
2003
ACM
14 years 1 months ago
MANTIS: system support for multimodAl NeTworks of in-situ sensors
The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded embedded operating system integrated with a general-purpose single-board hardwar...
Hector Abrach, Shah Bhatti, James Carlson, Hui Dai...
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...