Sciweavers

2337 search results - page 81 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 3 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
IADIS
2004
13 years 11 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu
SKG
2006
IEEE
14 years 4 months ago
Multi-layer Grid Portal Architecture Based on Mobile Agent
Many Grid portal architectures have three layers: browser, portal and Grid environment. We design a multi-layer Grid portal architecture, which introduced Mobile Agent; the mobile...
Fang Juan
CCS
2010
ACM
13 years 9 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
IEEEARES
2007
IEEE
14 years 4 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...