Sciweavers

2178 search results - page 50 / 436
» Toward Systemically Secure IT Architectures
Sort
View
SOUPS
2010
ACM
15 years 7 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
ISSE
2006
15 years 3 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
126
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 10 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
160
Voted
ACMSE
2008
ACM
15 years 5 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
135
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...