Sciweavers

1770 search results - page 253 / 354
» Writing requirements in computer security
Sort
View
174
Voted
DIM
2006
ACM
15 years 9 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
131
Voted
ASPLOS
2006
ACM
15 years 7 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
131
Voted
CSFW
2004
IEEE
15 years 7 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
117
Voted
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 5 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
115
Voted
NSPW
2006
ACM
15 years 9 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti