Sciweavers

3452 search results - page 134 / 691
» Secure Data Outsourcing
Sort
View
ECSA
2008
Springer
13 years 12 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
AISM
2004
13 years 11 months ago
Need to Know: Security or Liability?
The `Need to Know' concept is often quoted but rarely defined in the literature. In general the principle directs that unless an individual has a specific reason to have acce...
Christopher Bolan
IDTRUST
2009
ACM
14 years 4 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
ACSAC
2003
IEEE
14 years 1 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
CSREASAM
2010
13 years 8 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen