Sciweavers

3149 search results - page 159 / 630
» IT security risk management
Sort
View
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 2 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
WETICE
2003
IEEE
14 years 2 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell
CCS
1994
ACM
14 years 1 months ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
IDTRUST
2010
ACM
14 years 2 months ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....
ESCIENCE
2005
IEEE
14 years 2 months ago
GAMA: Grid Account Management Architecture
Security is a critical component of grid systems and while there are numerous software components and tools that provide some capabilities relating to security, there are few comp...
Karan Bhatia, Sandeep Chandra, Kurt Mueller