Sciweavers

18697 search results - page 136 / 3740
» Systemic Security Management
Sort
View
XMLSEC
2003
ACM
15 years 9 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
SACMAT
2009
ACM
15 years 11 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
IDTRUST
2010
ACM
15 years 11 months ago
Biometrics-based identifiers for digital identity management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IDTRUST
2009
ACM
15 years 11 months ago
Privacy-preserving management of transactions' receipts for mobile environments
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer ...
99
Voted
CRITIS
2008
15 years 6 months ago
A Structured Approach to Incident Response Management in the Oil and Gas Industry
Maria B. Line, Eirik Albrechtsen, Martin Gilje Jaa...