Sciweavers

6555 search results - page 186 / 1311
» Secure attribute-based systems
Sort
View
110
Voted
ACISP
2003
Springer
15 years 7 months ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell
94
Voted
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
15 years 9 months ago
Exploring the Suitability of IS Security Management Standards for SMEs
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standa...
Yves Barlette, Vladislav Fomin
109
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
142
Voted
SP
2000
IEEE
15 years 7 months ago
Security and Source Code Access: Issues and Realities
This position paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source cod...
Steven B. Lipner
118
Voted
SEC
2003
15 years 4 months ago
World Framework for Security Benchmark Changes
: The paper contains presentation of a framework, which would significantly increase quality of information security products and procedures, and Commentary on difficulties of impl...
Lech J. Janczewski, Andrew M. Colarik