Sciweavers

18697 search results - page 16 / 3740
» Systemic Security Management
Sort
View
DRM
2003
Springer
15 years 9 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
122
Voted
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 8 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
REFSQ
2010
Springer
15 years 5 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...
IH
1998
Springer
15 years 8 months ago
Modeling the Security of Steganographic Systems
Jan Zöllner, Hannes Federrath, Herbert Kliman...
CCS
2009
ACM
16 years 4 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...