Sciweavers

1235 search results - page 23 / 247
» Formalizing information security knowledge
Sort
View
ICALP
2007
Springer
13 years 9 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
ICIS
2003
13 years 9 months ago
The Antecedents of Information Systems Development Capability in Firms: A Knowledge Integration Perspective
ThelinkagesbetweenISandbusinessunitsarerecognizedasbeingcriticaltoinformationsystemsdevelopment processes and outcomes. Previous research has found that they are associated with b...
Amrit Tiwana, Anandhi S. Bharadwaj, V. Sambamurthy
IASTEDSEA
2004
13 years 9 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
CHI
2008
ACM
13 years 9 months ago
Sesame: informing user security decisions with system visualization
Non-expert users face a dilemma when making security decisions. Their security often cannot be fully automated for them, yet they generally lack both the motivation and technical ...
Jennifer Stoll, Craig S. Tashman, W. Keith Edwards...