Sciweavers

2270 search results - page 114 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
WWW
2008
ACM
14 years 9 months ago
Web people search: results of the first evaluation and the plan for the second
This paper presents the motivation, resources and results for the first Web People Search task, which was organized as part of the SemEval-2007 evaluation exercise. Also, we will ...
Javier Artiles, Satoshi Sekine, Julio Gonzalo
DEXAW
2003
IEEE
128views Database» more  DEXAW 2003»
14 years 2 months ago
Current Mobile Payment Procedures on the German Market from the View of Customer Requirements
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the mos...
Key Pousttchi, Mario Zenker
ACNS
2006
Springer
81views Cryptology» more  ACNS 2006»
14 years 2 months ago
A Handy Multi-coupon System
A coupon is an electronic data that represents the right to access a service provided by a service provider (e.g. gift certificates or movie tickets). Recently, a privacyprotectin...
Sébastien Canard, Aline Gouget, Emeline Huf...
SACMAT
2010
ACM
13 years 7 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
WISA
2004
Springer
14 years 2 months ago
A Probabilistic Method for Detecting Anomalous Program Behavior
In this paper, we, as well as Eskin, Lee, Stolfo [7] propose a method of prediction model. In their method, the program was characterized with both the order and the kind of system...
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai