Sciweavers

2846 search results - page 115 / 570
» Not one click for security
Sort
View
VIZSEC
2007
Springer
15 years 10 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
UCS
2004
Springer
15 years 9 months ago
Realizing a Secure Federation of Multi-institutional Service Systems
Abstract. This paper proposes an extended framework for service provision for ubiquitous spaces based on Kerberos. The framework allows groups of services and information about ord...
Yu Enokibori, Nobuhiko Nishio
PDP
2010
IEEE
15 years 9 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
15 years 9 months ago
Public Attitudes towards a National Identity "Smart Card: " Privacy and Security Concerns
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Brille
FASE
2003
Springer
15 years 9 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft