Sciweavers

15379 search results - page 197 / 3076
» Protecting users from
Sort
View
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
SACMAT
2009
ACM
14 years 22 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
13 years 10 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
CN
2007
137views more  CN 2007»
13 years 8 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
CORR
2011
Springer
196views Education» more  CORR 2011»
12 years 12 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum