Sciweavers

129 search results - page 14 / 26
» Trust by design: information requirements for appropriate tr...
Sort
View
IPAW
2010
13 years 5 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
ICCCN
2008
IEEE
14 years 2 months ago
Autonomic Management of Hybrid Sensor Grid Systems and Applications
: In this paper, we propose an autonomic management framework (ASGrid) to address the requirements of emerging large-scale applications in hybrid grid and sensor network systems. T...
Xiaolin Li, Xinxin Liu, Huanyu Zhao, Nanyan Jiang,...
GLOBECOM
2010
IEEE
13 years 6 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
CHI
2007
ACM
14 years 8 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
ESORICS
2007
Springer
14 years 2 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...