Sciweavers

1422 search results - page 163 / 285
» Information security and risk management
Sort
View
WISEC
2010
ACM
13 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
SOUPS
2010
ACM
14 years 2 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 10 months ago
A two-step fusion process for multi-criteria decision applied to natural hazards in mountains
Abstract--Mountain river torrents and snow avalanches generate human and material damages with dramatic consequences. Knowledge about natural phenomenona is often lacking and exper...
Jean-Marc Tacnet, Mireille Batton-Hubert, Jean Dez...
SIGCOMM
1998
ACM
14 years 2 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
SACMAT
2009
ACM
14 years 5 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...