Sciweavers

286 search results - page 37 / 58
» Requirements of Secure Storage Systems for Healthcare Record...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
SASN
2005
ACM
14 years 1 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
MSWIM
2006
ACM
14 years 1 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 1 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
CHI
2010
ACM
14 years 2 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle