Sciweavers

3149 search results - page 68 / 630
» IT security risk management
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 2 months ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...
CCS
2001
ACM
14 years 1 months ago
Privacy Engineering for Digital Rights Management Systems
Joan Feigenbaum, Michael J. Freedman, Tomas Sander...
CCS
2001
ACM
14 years 1 months ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...
SP
1999
IEEE
110views Security Privacy» more  SP 1999»
14 years 1 months ago
Firmato: A Novel Firewall Management Toolkit
Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai...