Sciweavers

2422 search results - page 124 / 485
» Security Policy Consistency
Sort
View
ESORICS
2011
Springer
14 years 4 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
SAINT
2003
IEEE
15 years 10 months ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 10 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
IJMI
2007
140views more  IJMI 2007»
15 years 4 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ACSAC
2009
IEEE
15 years 11 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...