Sciweavers

3149 search results - page 148 / 630
» IT security risk management
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Policy-Based Management: Bridging the Gap
In a policy-based system, policy goals are described with respect to network entities (e.g., networks and users) instead of enforcement points (e.g., firewalls and routers). This ...
Susan Hinrichs
ACSAC
1999
IEEE
14 years 1 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
SOUPS
2005
ACM
14 years 2 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
TR
2008
98views more  TR 2008»
13 years 9 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
ICASSP
2011
IEEE
13 years 28 days ago
Zero leakage quantization scheme for biometric verification
Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new ...
Joep A. de Groot, Jean-Paul M. G. Linnartz