Sciweavers

1073 search results - page 37 / 215
» Secure context-sensitive authorization
Sort
View
IDTRUST
2009
ACM
14 years 3 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
INFORMATICALT
2007
81views more  INFORMATICALT 2007»
13 years 9 months ago
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem
A generalized group-oriented cryptosystem (GGOC) based on ElGamal cryptosystem was proposed by Yang et al. in 2003. This study shows that if the authorized decryption sets of users...
Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 9 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis

Lecture Notes
404views
15 years 7 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
IEEEARES
2006
IEEE
14 years 3 months ago
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy
This paper extends the work described in “An Approach to the Formalisation of a Certification Policy”, 7th International Symposium on System and Information Security (SSI 2005...
Omar Batarfi, Lindsay Marshall