A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing | 0 | 0.34 | 2022 |
Cybersecurity Strategies for Smart Grids. | 0 | 0.34 | 2016 |
A Security Analysis on Apple Pay. | 0 | 0.34 | 2016 |
Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation. | 0 | 0.34 | 2016 |
Security Automation for Information Security Continuous Monitoring: Research Framework | 0 | 0.34 | 2016 |
Game Theoretic Modeling of Security and Interdependency in a Public Cloud | 9 | 0.66 | 2014 |
Social network attack simulation with honeytokens. | 5 | 0.40 | 2014 |
Trusted Online Social Network (OSN) services with optimal data management. | 6 | 0.45 | 2014 |
Component survivability at runtime for mission-critical distributed systems | 1 | 0.35 | 2013 |
Game theoretic attack analysis in online social network (OSN) services | 6 | 0.46 | 2013 |
Near-Real-Time Cloud Auditing for Rapid Response | 9 | 0.77 | 2012 |
Towards trusted data management in online social network (OSN) services | 5 | 0.45 | 2012 |
A Game Theoretic Approach For Modeling Optimal Data Sharing On Online Social Networks | 6 | 0.46 | 2012 |
Optimal State Management of Data Sharing in Online Social Network (OSN) Services | 7 | 0.45 | 2012 |
Surviving in Cyberspace: A Game Theoretic Approach. | 6 | 0.46 | 2012 |
Active access control (AAC) with fine-granularity and scalability | 4 | 0.46 | 2011 |
Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications | 0 | 0.34 | 2009 |
Towards trusted intelligence information sharing | 2 | 0.42 | 2009 |
Problem Analyses and Recommendations in DRM Security Policies | 0 | 0.34 | 2008 |
Fine-Grained and Scalable Approaches for Message Integrity | 2 | 0.36 | 2007 |
Fine-Grained and Scalable Message Protection in Sensitive Organizations | 4 | 0.42 | 2007 |
Cooperative component testing architecture in collaborating network environment | 3 | 0.45 | 2007 |
Spam Detection: Increasing Accuracy With A Hybrid Solution | 1 | 0.43 | 2006 |
Access control requirements for preventing insider threats | 2 | 0.40 | 2006 |
Component Integrity Check and Recovery Against Malicious Codes | 4 | 0.48 | 2006 |
A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems | 3 | 0.40 | 2006 |
Packet marking based cooperative attack response service for effectively handling suspicious traffic | 1 | 0.36 | 2006 |
Towards an effective wireless security policy for sensitive organizations | 0 | 0.34 | 2005 |
Trusted identity and session management using secure cookies | 1 | 0.44 | 2005 |
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems | 4 | 0.46 | 2005 |
Security Analyses for Enterprise Instant Messaging (EIM) Systems | 1 | 0.35 | 2005 |
A composite rbac approach for large, complex organizations | 22 | 0.95 | 2004 |
A Framework For Trusted Wireless Sensor Networks | 0 | 0.34 | 2004 |
Static vs. dynamic recovery models for survivable distributed systems | 14 | 0.82 | 2004 |
Component-abnormality detection and immunization for survivable systems in large distributed environments | 2 | 0.37 | 2004 |
Role-based access control for collaborative enterprise in peer-to-peer computing environments | 33 | 1.47 | 2003 |
Towards Secure Collaboration on the Semantic Web | 4 | 0.43 | 2003 |
WLAN Security: Current and Future | 10 | 1.40 | 2003 |
An application of directory service markup language (DSML) for role-based access control (RBAC) | 3 | 0.42 | 2002 |
A secure workflow system for dynamic collaboration | 7 | 0.75 | 2001 |
Role-based access control on the web using LDAP | 5 | 0.49 | 2001 |
Access control mechanisms for inter-organizational workflow | 97 | 7.41 | 2001 |
Role-based access control on the web | 117 | 11.03 | 2001 |
Secure Cookies on the Web | 70 | 5.90 | 2000 |
RBAC on the Web by smart certificates | 32 | 3.90 | 1999 |
Decentralized user-role assignment for Web-based intranets | 21 | 4.08 | 1998 |