Sciweavers

3149 search results - page 124 / 630
» IT security risk management
Sort
View
OZCHI
2006
ACM
14 years 3 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
PERCOM
2009
ACM
14 years 4 months ago
Securing Body Sensor Networks: Sensor Association and Key Management
—Body Sensor Networks can be used to continuously monitor patients’ health. However, secure association of sensors with the patient and key management for providing integrity a...
Sye Loong Keoh, Emil C. Lupu, Morris Sloman
ICIC
2009
Springer
14 years 3 months ago
Ontology-Based Decision Support for Security Management in Heterogeneous Networks
Abstract. In this paper our original methodology of applying ontologybased logic into decision support system for security management in heterogeneous networks is presented. Such d...
Michal Choras, Rafal Kozik, Adam Flizikowski, Rafa...
WWW
2005
ACM
14 years 9 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
14 years 2 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier