Sciweavers

3149 search results - page 166 / 630
» IT security risk management
Sort
View
WWW
2006
ACM
14 years 10 months ago
Archiving web site resources: a records management view
In this paper, we propose the use of records management principles to identify and manage Web site resources with enduring value as records. Current Web archiving activities, coll...
Maureen Pennock, Brian Kelly
INFOCOM
2008
IEEE
14 years 3 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
ISW
2007
Springer
14 years 3 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...
ISW
2009
Springer
14 years 3 months ago
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. De...
IH
1998
Springer
14 years 1 months ago
Modeling the Security of Steganographic Systems
Jan Zöllner, Hannes Federrath, Herbert Kliman...