Sciweavers

14850 search results - page 93 / 2970
» The Security of
Sort
View
CCS
1993
ACM
14 years 2 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
14 years 12 days ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
AISM
2004
13 years 11 months ago
Developing a framework for understanding Security Governance
With reported security incidents in organisations on the increase, effective Security Governance is expected to become a major issue in organisations. A research framework of Secu...
C. C. Terence Tan
ECIS
2000
13 years 11 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
CORR
2006
Springer
133views Education» more  CORR 2006»
13 years 10 months ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck