Sciweavers

85 search results - page 10 / 17
» SPS-VN: Research on the Security Policy System for Virtual N...
Sort
View
AINA
2009
IEEE
14 years 19 days ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CCS
2009
ACM
14 years 2 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
ICSOC
2004
Springer
14 years 27 days ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...