Sciweavers

1422 search results - page 23 / 285
» Information security and risk management
Sort
View
AOSD
2009
ACM
14 years 3 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
14 years 2 months ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell
CTW
2002
75views more  CTW 2002»
13 years 8 months ago
The Use of a Formalised Risk Model in NHS Information System Development
: Information Systems (IS) and technology are used extensively throughout the NHS, and the 1998 national information strategy, "Information for Health", sets out how the ...
M. A. Jeffcott, C. W. Johnson
SACMAT
2004
ACM
14 years 2 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
ECUMN
2007
Springer
14 years 3 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...