Sciweavers

CSREASAM
2006
14 years 28 days ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
CSREASAM
2006
14 years 28 days ago
MRAS: A Multi-Layered Remote Authentication System
: Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate prog...
Wilfrid Mirville, Jamie Kobie, Michael Nelson
CSREASAM
2006
14 years 28 days ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp
CSREASAM
2006
14 years 28 days ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
CSREASAM
2006
14 years 28 days ago
Custom Plugin - A Solution to Phishing and Pharming Attacks
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Omer Mahmood
CSREASAM
2006
14 years 28 days ago
Modeling Role-based Trust and Authority in Open Environments
Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents ...
Dongwan Shin
CSREASAM
2006
14 years 28 days ago
FireCrocodile: A Checker for Static Firewall Configurations
Norbert Lehmann, Reinhard Schwarz, Jörg Kelle...
CSREASAM
2006
14 years 28 days ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
CSREASAM
2006
14 years 28 days ago
Acoustic Surveillance of Physically Unmodified PCs
Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known that electromagnetic emanations can reveal informatio...
Michael LeMay, Jack Tan
CSREASAM
2006
14 years 28 days ago
A Survey of Unimodal Biometric Methods
Apart from making the authentication system reliable, biometric systems reduce the time required for authentication considerably at the airports, borders, and government offices. ...
Shahram Latifi, Nimalan Solayappan