Sciweavers

1073 search results - page 83 / 215
» Secure context-sensitive authorization
Sort
View
CORR
2008
Springer
68views Education» more  CORR 2008»
15 years 2 months ago
Impact of Vehicular Communications Security on Transportation Safety
Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time...
Panos Papadimitratos, Giorgio Calandriello, Jean-P...
ESSOS
2011
Springer
14 years 5 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
CSCW
2012
ACM
13 years 10 months ago
Community-based web security: complementary roles of the serious and casual contributors
Does crowdsourcing work for web security? While the herculean task of evaluating hundreds of millions of websites can certainly benefit from the wisdom of crowds, skeptics questi...
Pern Hui Chia, John Chuang
CCS
2009
ACM
16 years 2 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
CHI
2007
ACM
16 years 2 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...