Sciweavers

2270 search results - page 225 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
IEEEARES
2006
IEEE
15 years 10 months ago
Offline Internet Banking Fraud Detection
Nowadays, most important topic about internet banking is security. Banks’ basic concern is ensuring their customers’ electronic transactions. Nevertheless, fraudsters are beco...
Vasilis Aggelis
SACMAT
2004
ACM
15 years 10 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
149
Voted
IADIS
2003
15 years 5 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
WISTP
2010
Springer
15 years 11 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
CCS
2009
ACM
15 years 11 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino