Sciweavers

1073 search results - page 65 / 215
» Secure context-sensitive authorization
Sort
View
CSREASAM
2007
13 years 11 months ago
Survey of Supercomputer Cluster Security Issues
- The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters...
George Markowsky, Linda Markowsky
MKWI
2008
137views Business» more  MKWI 2008»
13 years 11 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 5 months ago
Secure Communication and Access Control for Mobile Web Service Provisioning
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
Satish Narayana Srirama, Anton Naumenko
IEEEARES
2006
IEEE
14 years 4 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
CCS
2008
ACM
14 years 5 days ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...