Results 1 - 10
of
69
A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool
"... Abstract—For the benefits of e-business to be fully realized, there are numerous challenges to be over-come particularly with respect to security. Some of the most significant of these difficulties is incurred even before businesses fully enter the joint e-business interactions. A key example is the ..."
Abstract
- Add to MetaCart
is the challenge faced as partnering e-businesses come together initially to share, compare and negotiate on their individual se-curity needs. In previous work, we have proposed a support tool to assist in this activity and stream-line several of the difficult security negotiation tasks which arise. This paper
Effects Of Livelihood Diversification On Food Se- curity Status Of Farm Households In North Gondar
"... ABSTRACT: Although still of central importance, farming on its own is increasingly unable to provide a sufficient means of survival in rural areas. Further, the asset base of farmers is not diversified, so loss of farming productivity during severe drought results in the total loss of assets and hen ..."
Abstract
- Add to MetaCart
and hence results in food insecurity and dependency on food aid. Therefore, it was crucial to identify the causes and consequences of food insecurity; assess the different livelihood strategies and their role to household food security status; and examine the effect of livelihood diversification
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics
- in Software Reliability Engineering, 2006. ISSRE ’06. 17th International Symposium on, 2006
"... Most computer systems rely on usernames and pass-words as a mechanism for authentication and access con-trol. These credential sets offer weak protection to a broad scope of applications with differing levels of sensitivity. Traditional physiological biometric systems such as finger-print, face, and ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
by incorporating shift-key patterns. The system is capable of operating at various points on a traditional ROC curve depending on application specific se-curity needs. A 1 % False Accept Rate is attainable at a 14% False Reject Rate. An Equal Error Rate of 5 % is suitable for systems requiring a relatively low
Secure and Mobile P2P File Sharing
"... In today’s Internet, a major portion of the total traffic is gen-erated by peer-to-peer applications such as Skype and BitTor-rent. The amount of this traffic has been increasing since the beginning of this decade. At the same time, mobile use of the Internet has become even more popular. New mobile ..."
Abstract
- Add to MetaCart
of mobile devices affect the application design and network architecture choices. We also focus on the security and privacy aspects of mobile P2P networks. Functionality of P2P networks can be divided into two parts, into content location, and into content download. Se-curity needs of both
Access control: Policies, models, and mechanism
- In Foundations of Security Analysis and Design - Tutorial Lectures, R. Focardi and F. Gorrieri, Eds
, 2001
"... Abstract. Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access control decision is enforced by a mechanism implementing regulations established by a secu-rity policy. Differen ..."
Abstract
-
Cited by 67 (6 self)
- Add to MetaCart
. Different access control policies can be applied, corresponding to different criteria for defining what should, and what should not, be allowed, and, in some sense, to different definitions of what ensuring se-curity means. In this chapter we investigate the basic concepts behind access control design
Towards a Semantic Web Security Infrastructure
- Stanford University, Stanford California
, 2004
"... The move towards supporting more autonomous systems, where decisions are made without direct user intervention, and more complex operating scenarios, where services from multiple organisations form temporary ties to solve particular problems, creates new security challenges. This paper argues that t ..."
Abstract
-
Cited by 32 (2 self)
- Add to MetaCart
that the answers should combine the use of conventional se-curity solutions, such as cryptographic mechanisms, with the ability to reason about security at the semantic level, using appropriate descriptions of security policies and the required tasks. Such reasoning can enable software entities aiming to interact
Securing the Borealis data stream engine, in
- Proc. of the IDEAS
"... As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach to secure DSMSs. We propose a general se-curity framework and an access control model to secure DSMSs. We implement our f ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach to secure DSMSs. We propose a general se-curity framework and an access control model to secure DSMSs. We implement our
NoC-centric security of reconfigurable soc
- in Proc. of NOCS’07
, 2007
"... This paper presents a first solution for NoC-based communication security. Our proposal is based on simple network interfaces implementing distributed security rule checking and a separation between se-curity and application channels. We detail a four-step security policy and show how, with usual NO ..."
Abstract
-
Cited by 24 (6 self)
- Add to MetaCart
This paper presents a first solution for NoC-based communication security. Our proposal is based on simple network interfaces implementing distributed security rule checking and a separation between se-curity and application channels. We detail a four-step security policy and show how, with usual
E.: Smart object design for active security management of hazardous products
- In: DIPSO Workshop
, 2007
"... Abstract Hazardous substances are products that need special attention from the personnel which manipulates them, therefore, there is an increased need for better security management of goods and people in chemical industries. In this paper we propose the design of the Smart Object capable to survey ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
to survey its own environment ac-cording to its own security rules and to cooperate with others surounding equiped products to manage the se-curity level in acceptable boundaries. By this way, an Active Security Environment is created, in which, haz-ardous products transformed into Smart Objects moni
A Method for Eliciting Security Requirements from the Business Process Models
"... Abstract. In recent years, the business process modelling is matured towards expressing enterprise’s organisational behaviour (i.e., business values and stakeholder interests). This shows potential to perform early security analysis to capture enterprise security needs. Traditionally, se-curity in b ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Abstract. In recent years, the business process modelling is matured towards expressing enterprise’s organisational behaviour (i.e., business values and stakeholder interests). This shows potential to perform early security analysis to capture enterprise security needs. Traditionally, se-curity
Results 1 - 10
of
69