Sciweavers

1484 search results - page 256 / 297
» Security policies for downgrading
Sort
View
ACSAC
2001
IEEE
14 years 4 days ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes
ACSAC
2001
IEEE
14 years 4 days ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
BCSHCI
2007
13 years 10 months ago
A card-sorting probe of e-banking trust perceptions
This paper investigates the issue of trust mediation in eBanking. The card sorting technique was used to probe factors influencing subjects’ attitudes to alternative e-banking h...
Tim French, Kecheng Liu, Mark Springett
IPCV
2007
13 years 10 months ago
QIM-Based Histogram-Preserving and High Capacity Steganography for JPEG Images
- We propose a secure steganographic approach with a high capacity. We first use small neighborhoods of the original histogram to calculate the minimum remapping from a histogram t...
Xiaojun Qi, Daniel Lewis
DBSEC
2004
83views Database» more  DBSEC 2004»
13 years 10 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu