Sciweavers

1564 search results - page 7 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
IDTRUST
2010
ACM
14 years 2 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
13 years 9 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
OOPSLA
2000
Springer
13 years 11 months ago
Practical virtual method call resolution for Java
Vijay Sundaresan, Laurie J. Hendren, Chrislain Raz...
CCS
2008
ACM
13 years 9 months ago
PEREA: towards practical TTP-free revocation in anonymous authentication
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
BIS
2009
112views Business» more  BIS 2009»
13 years 5 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri