Sciweavers

1663 search results - page 238 / 333
» Privacy and Identity Management
Sort
View
124
Voted
CCS
2007
ACM
15 years 10 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
CCS
2007
ACM
15 years 10 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ISI
2007
Springer
15 years 10 months ago
On-Demand Information Portals for Disaster Situations
Abstract—This paper describes our work on developing technology for rapidly assembling information portals that provide integrated access to and analysis of information from mult...
Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariha...
133
Voted
WISA
2007
Springer
15 years 10 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
CSFW
2006
IEEE
15 years 10 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....