Sciweavers

2178 search results - page 107 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ICWS
2004
IEEE
13 years 10 months ago
Managing and Securing Web Services with VPNs
Web Services constitute a set of technologies that many believe will change the web communication landscape within the next few years. They offer standardized and easy communicati...
Lina Alchaal, Vincent Roca, Michel Habert
ICCSA
2009
Springer
14 years 3 months ago
Towards Location-Based Real-Time Monitoring Systems in u-LBS
Recently, ubiquitous location-based services (u-LBS) has been utilized in a variety of practical and mission-critical applications such as security services, personalization servic...
MoonBae Song, Hyunseung Choo
ICIAR
2005
Springer
14 years 2 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
CAISE
2006
Springer
14 years 26 days ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
IEEEARES
2007
IEEE
14 years 3 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...