Results 241 to 250 of about 244,839 (300)
Some of the next articles are maybe not open access.

Transaction Security System

IBM Systems Journal, 1991
Components of previous security systems were designed independently from one another and were often difficult to integrate. Described is the recently available IBM Transaction Security System. It implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems ...
D. G. Abraham   +3 more
openaire   +1 more source

Transactions in Securities

2015
Abstract Chapter 15 examines the transnational legal framework for intermediated securities. It describes the shift from a world in which securities were primarily held and traded in paper form to a market in which they are held in immobilized or dematerialized form and traded through intermediaries.
openaire   +3 more sources

Seamless secured transactions

Information Management & Computer Security, 1998
Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self‐signed certification authorities. Depicts the relevant layers of interactions each option entails.
Carrie Liddy, Alice Sturgeon
openaire   +1 more source

Secure, reliable, transacted

Proceedings of the 2004 ACM SIGMOD international conference on Management of data, 2004
This paper discusses the design of Web Services Protocols paying special attention to composition of such protocols. The transaction related protocols are discussed as exemplars.
openaire   +1 more source

Security correctness for secure nested transactions

Proceedings of the 7th Workshop on Programming Languages and Analysis for Security, 2012
This article considers the synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is an approach to supporting end-to-end security for a wide class of enterprise applications, those of concurrent transactional applications.
Dominic Duggan, Ye Wu
openaire   +1 more source

Secure Display and Secure Transactions Using a Handset

International Conference on the Management of Mobile Business (ICMB 2007), 2007
The security risks of using standard personal computers and operating systems for confidential transactions such as Internet banking are well-known. This is one reason for the interest in the mobile phone/ handset as a Personal Trusted Device (PTD).
Sandeep Singh Ghotra   +4 more
openaire   +2 more sources

Transactions and Security

2010
Transaction and security management are important matters for enterprises. They allow applications to have consistent data and secure the access to it. Both services are low-level concerns that a business developer shouldn’t have to code himself. EJBs provide these services in a very simple way: either programmatically with a high level of abstraction ...
openaire   +1 more source

Security of Internet Transactions

2009
State-of-the-art IT facilities are ever more frequently applied in all areas of life. Nowadays, Internet connection, online resources and services are taken for granted. It is much quicker (almost immediate) and more convenient to access electronic information and use online services than to employ traditional methods.
Zygmunt Mazur   +2 more
openaire   +1 more source

Secure Transaction Authentication Protocol

2016
A protocol for NFC mobile authentication and transaction is proposed by W. Chen et al. This protocol is used for micropayments, where the Mobile Network Operator pays for its customers. The main advantage of this protocol is its compatibility with the existing GSM network.
Pardis Pourghomi   +2 more
openaire   +1 more source

Securely executing multilevel transactions

1996
In this paper, we show how arbitrary multilevel transactions—transactions that have the ability to read and write data at multiple levels—can be executed using the inherently secure low-first algorithm. To this end, we combine a trusted caching facility with a multiversion timestamp ordering algorithm in a manner that is both secure and yields one-copy
Sushil Jajodia   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy