Sciweavers

1407 search results - page 106 / 282
» Systems Theory Model for Information Security
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 2 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
14 years 2 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
CCS
2009
ACM
14 years 24 days ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
WWW
2005
ACM
14 years 8 months ago
Hybrid semantic tagging for information extraction
The semantic web is expected to have an impact at least as big as that of the existing HTML based web, if not greater. However, the challenge lays in creating this semantic web an...
Ronen Feldman, Binyamin Rosenfeld, Moshe Fresko, B...
ISIM
2007
13 years 9 months ago
Component Model with Support of Mobile Architectures
Common features of current information systems have significant impact on software architectures of these systems. The systems can not be realised as monoliths, formal specifica...
Marek Rychlý