Sciweavers

1422 search results - page 136 / 285
» Information security and risk management
Sort
View
CSE
2009
IEEE
14 years 5 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
DBSEC
2011
245views Database» more  DBSEC 2011»
13 years 1 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
DRM
2004
Springer
14 years 3 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
IH
1998
Springer
14 years 2 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes
ICISS
2005
Springer
14 years 3 months ago
VTrust: A Trust Management System Based on a Vector Model of Trust
Abstract. Trust can be used to measure our confidence that a secure system behaves as expected. We had previously proposed a vector model of trust [1]. In this work we address the...
Indrajit Ray, Sudip Chakraborty, Indrakshi Ray