Sciweavers

451 search results - page 66 / 91
» What Is a Conversation Policy
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 2 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
JUCS
2006
225views more  JUCS 2006»
13 years 9 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
WWW
2003
ACM
14 years 10 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
WWW
2010
ACM
14 years 4 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
HICSS
2010
IEEE
240views Biometrics» more  HICSS 2010»
14 years 4 months ago
Can e-Government Adopters Benefit from a Technology-First Approach? The Case of Egypt Embarking on Service-Oriented Architecture
It seems common sense that “policy matters” in setting up e-government interoperability, mainly because collaboration should be guided by dedicated integration objectives and ...
Ralf Klischewski, Ranwa Abubakr