Sciweavers

776 search results - page 14 / 156
» Securing user inputs for the web
Sort
View
116
Voted
CCS
1999
ACM
15 years 7 months ago
Using Smartcards to Secure a Personalized Gambling Device
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
William Aiello, Aviel D. Rubin, Martin Strauss
147
Voted
AGENTS
1999
Springer
15 years 7 months ago
Adaptive Web Site Agents
We discuss the design of a class of agents that we call adaptive web site agents. The goal of such an agent is to help a user find information at a particular web site, adapting i...
Michael J. Pazzani, Daniel Billsus
ETFA
2005
IEEE
15 years 9 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
116
Voted
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 5 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
140
Voted
ICWS
2004
IEEE
15 years 4 months ago
Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging
This paper presents an emerging tool for security configuration of service-oriented architectures with Web Services. Security is a major concern when implementing mission-critical...
Michiaki Tatsubori, Takeshi Imamura, Yuhichi Nakam...