Sciweavers

669 search results - page 117 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
14 years 1 months ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell
DANCE
2002
IEEE
14 years 1 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
SPAA
2010
ACM
14 years 1 months ago
Lightweight, robust adaptivity for software transactional memory
When a program uses Software Transactional Memory (STM) to synchronize accesses to shared memory, the performance often depends on which STM implementation is used. Implementation...
Michael F. Spear
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 29 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
HICSS
1999
IEEE
123views Biometrics» more  HICSS 1999»
14 years 23 days ago
Analysis of Power Pools in the Deregulated Energy Market through Simulation
The electricity market has changed rapidly in the Northern European countries. Harmonisation of the legislation and trading methods widens the market area outside national limits....
Simo Makkonen, Risto Lahdelma