Sciweavers

3149 search results - page 193 / 630
» IT security risk management
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 9 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
NETWORK
2008
151views more  NETWORK 2008»
13 years 9 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis
CORR
1999
Springer
70views Education» more  CORR 1999»
13 years 9 months ago
Restart Strategies and Internet Congestion
We recently presented a methodology to quantitatively reduce the average time and variance in the time required to execute electronic transactions in a network environment such as...
Sebastian M. Maurer, Bernardo A. Huberman
TRUST
2010
Springer
13 years 8 months ago
The Role of Soft Information in Trust Building: Evidence from Online Social Lending
We analyze empirical data of Germany’s largest online social lending platform Smava.de to exemplarily study the contribution of unstructured, ambiguous, or unverified informatio...
Stefanie Pötzsch, Rainer Böhme