Sciweavers

14850 search results - page 152 / 2970
» The Security of
Sort
View
PERCOM
2006
ACM
14 years 9 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
IACR
2011
142views more  IACR 2011»
12 years 9 months ago
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a ...
Johannes Buchmann, Erik Dahmen, Andreas Hülsi...
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
14 years 4 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
14 years 4 months ago
Organizational Impacts of Cyber Security Provisions: A Sociotechnical Framework
In this paper, we outline a conceptual framework for linking cyber security provisions to business processes. The framework is presented for use in analyzing the cost and performa...
Anthony M. Cresswell, Shahidul Hassan
ISW
1997
Springer
14 years 2 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng