Sciweavers

1422 search results - page 112 / 285
» Information security and risk management
Sort
View
ICNS
2007
IEEE
14 years 4 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
DISCEX
2003
IEEE
14 years 3 months ago
TetherNet Anti-NAT - Secure Internet Subnet Rental System
1 TetherNet is a system for dynamically relocating Internet subnets. It provides real Internet service consisting of real IP addresses, and forward and reverse DNS, even behind NAT...
Joseph D. Touch, Lars Eggert, Yu-Shun Wang
ETRICS
2006
14 years 1 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
CAISE
2006
Springer
14 years 2 months ago
Goal-oriented Analysis of Regulations
This paper explains how goal-oriented requirements engineering can be transposed into regulation modelling. It motivates also why this way of modelling regulations is worthwhile fo...
Robert Darimont, Michel Lemoine