Sciweavers

120 search results - page 9 / 24
» Security Games with Protection Externalities
Sort
View
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 9 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
IEEEARES
2007
IEEE
14 years 4 months ago
A Near-Real-Time Behaviour Control Framework
The NuBric behaviour control framework (BCF) is a near-real-time framework written entirely in Java based on the paradigms of both role based access control (RBAC) and policy base...
Bastian Preindl, Alexander Schatten
BCSHCI
2008
13 years 11 months ago
Helping users create and remember more secure text passwords
This doctoral research aims to persuade users to choose and remember more secure text passwords. The first component involved user studies demonstrating that users can be persuade...
Alain Forget
CCS
2008
ACM
13 years 11 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...