Sciweavers

1422 search results - page 88 / 285
» Information security and risk management
Sort
View
ICDIM
2008
IEEE
14 years 4 months ago
Towards e-Government: The security SOA approach of the University of Murcia
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university c...
Daniel Sánchez-Martínez, C. Inmacula...
CHIMIT
2009
ACM
14 years 4 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
DRM
2003
Springer
14 years 3 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ACSAC
2004
IEEE
14 years 1 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
IDTRUST
2010
ACM
14 years 3 months ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....