Sciweavers

434 search results - page 18 / 87
» Security Documentation
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Authentic Time-Stamps for Archival Storage
Abstract. We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g.,...
Alina Oprea, Kevin D. Bowers
EDBTW
2006
Springer
13 years 9 months ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
ETRICS
2006
13 years 11 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
AISM
2004
13 years 9 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
DOCENG
2004
ACM
13 years 11 months ago
Aesthetic measures for automated document layout
A measure of aesthetics that has been used in automated layout is described. The approach combines heuristic measures of attributes that degrade the aesthetic quality. The combina...
Steven J. Harrington, J. Fernando Naveda, Rhys Pri...