Sciweavers

5665 search results - page 119 / 1133
» Introduction to Computer Security
Sort
View
COMPUTER
2007
52views more  COMPUTER 2007»
13 years 9 months ago
Reengineering the Internet for Better Security
Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, ...
COMPUTER
2007
72views more  COMPUTER 2007»
13 years 9 months ago
Enterprise Security for Web 2.0
Mary Ann Davidson, Elad Yoran
ISF
2008
114views more  ISF 2008»
13 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
INFOCOM
2008
IEEE
14 years 3 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
ISW
2007
Springer
14 years 3 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...