Security paper

Results: 6621



#Item
271Computer security / Security / Access control / Computer access control / Role-based access control / PERMIS / Mandatory access control / Social networking service / Interpersonal ties / Social network / NIST RBAC model

Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
272

EDGS WORKING PAPER Number 19 “Power Struggle Over Land: Decentralization, Land Tenure Security, and the Rule of Law in Indonesia” Najmu Laila Sopian

Add to Reading List

Source URL: www.edgs.northwestern.edu

Language: English - Date: 2014-07-18 17:17:27
    273Fraud / Crimes / Deception / Property crimes / Identity theft / Identity fraud / Internet fraud / Social Security number / Employment fraud / Theft / Internet fraud prevention / Mass marketing fraud

    White Paper Identity Fraud Prevention How to Detect and Prevent Identity Based Fraud in Government.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:02
    274

    XCon 2013 XFocus Information Security Conference Call for Paper August, 22nd–23rd, 2013, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style, XCon sincerely welcomes contributions from information sec

    Add to Reading List

    Source URL: xcon.xfocus.org

    Language: English
      275Privacy / Economy / Business law / Human rights / Identity management / E-commerce / Law / Data security / Internet privacy / Information privacy / Medical privacy / Consumer privacy

      Economic Barriers to the Deployment of Existing Privacy Technologies (Position Paper) Joan Feigenbaum1 , Michael J. Freedman2 , Tomas Sander3 , Adam Shostack4 1

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 11:42:01
      276

      An extended abstract of this paper appeared in Information Security Conference—ISC’07, J. Garay Ed., LNCS ??, pages ??–??, Val Paraiso, Chile, 9–12 OctoberSpringer-Verlag, Berlin, Germany. This is the full

      Add to Reading List

      Source URL: www.cs.stevens.edu

      Language: English - Date: 2010-03-09 16:23:49
        277Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

        White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

        Add to Reading List

        Source URL: lexisnexis.com

        Language: English - Date: 2014-10-15 08:44:07
        278

        Security and Fraud Exceptions Under Do Not Track Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Position Paper for W3C Workshop on Web Tracking and User PrivacyApril 2011, Princ

        Add to Reading List

        Source URL: www.w3.org

        Language: English - Date: 2011-03-27 07:17:46
          279Economy / Finance / Money / Corporate finance / Bond / Security / Commercial paper / Securities market / Financial market / Capital structure / Convertible bond / Private equity

          A Research Project on Ranges of Financial Prices

          Add to Reading List

          Source URL: www.hkimr.org

          Language: English - Date: 2015-08-30 22:29:53
          280

          This paper was published in the Proceedings of the International Conference on Applied Cryptography and Information Security (ACIS) , 2006, pp. 327–337. Traceable Signature: Better Efficiency and Beyond⋆ He Ge1 and S

          Add to Reading List

          Source URL: nsl.cse.unt.edu

          Language: English - Date: 2012-01-12 18:49:58
            UPDATE