Sciweavers

6555 search results - page 50 / 1311
» Secure attribute-based systems
Sort
View
CODASPY
2011
13 years 10 days ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu

Lecture Notes
404views
15 years 6 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
STORAGESS
2006
ACM
14 years 2 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
CSREASAM
2003
13 years 10 months ago
Securing FIPA Agent Communication
— The agent paradigm has been the subject of much research during the last decade. Recently, security of multiagent systems has gained increased attention. In this paper we consi...
Niklas Borselius, Chris J. Mitchell
SRDS
1999
IEEE
14 years 1 months ago
Trust and Electronic Commerce - More than a Technical Problem
In our paper we argue that the building of trust in electronic commerce depends only partly on technical security and the knowledge of security gaps and ways of closing them. It i...
Kornelia Konrad, Gerhard Fuchs, Jochen Barthel