Results 241 to 250 of about 244,839 (300)
Some of the next articles are maybe not open access.
IBM Systems Journal, 1991
Components of previous security systems were designed independently from one another and were often difficult to integrate. Described is the recently available IBM Transaction Security System. It implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems ...
D. G. Abraham +3 more
openaire +1 more source
Components of previous security systems were designed independently from one another and were often difficult to integrate. Described is the recently available IBM Transaction Security System. It implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems ...
D. G. Abraham +3 more
openaire +1 more source
2015
Abstract Chapter 15 examines the transnational legal framework for intermediated securities. It describes the shift from a world in which securities were primarily held and traded in paper form to a market in which they are held in immobilized or dematerialized form and traded through intermediaries.
openaire +3 more sources
Abstract Chapter 15 examines the transnational legal framework for intermediated securities. It describes the shift from a world in which securities were primarily held and traded in paper form to a market in which they are held in immobilized or dematerialized form and traded through intermediaries.
openaire +3 more sources
Information Management & Computer Security, 1998
Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self‐signed certification authorities. Depicts the relevant layers of interactions each option entails.
Carrie Liddy, Alice Sturgeon
openaire +1 more source
Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self‐signed certification authorities. Depicts the relevant layers of interactions each option entails.
Carrie Liddy, Alice Sturgeon
openaire +1 more source
Proceedings of the 2004 ACM SIGMOD international conference on Management of data, 2004
This paper discusses the design of Web Services Protocols paying special attention to composition of such protocols. The transaction related protocols are discussed as exemplars.
openaire +1 more source
This paper discusses the design of Web Services Protocols paying special attention to composition of such protocols. The transaction related protocols are discussed as exemplars.
openaire +1 more source
Security correctness for secure nested transactions
Proceedings of the 7th Workshop on Programming Languages and Analysis for Security, 2012This article considers the synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is an approach to supporting end-to-end security for a wide class of enterprise applications, those of concurrent transactional applications.
Dominic Duggan, Ye Wu
openaire +1 more source
Secure Display and Secure Transactions Using a Handset
International Conference on the Management of Mobile Business (ICMB 2007), 2007The security risks of using standard personal computers and operating systems for confidential transactions such as Internet banking are well-known. This is one reason for the interest in the mobile phone/ handset as a Personal Trusted Device (PTD).
Sandeep Singh Ghotra +4 more
openaire +2 more sources
2010
Transaction and security management are important matters for enterprises. They allow applications to have consistent data and secure the access to it. Both services are low-level concerns that a business developer shouldn’t have to code himself. EJBs provide these services in a very simple way: either programmatically with a high level of abstraction ...
openaire +1 more source
Transaction and security management are important matters for enterprises. They allow applications to have consistent data and secure the access to it. Both services are low-level concerns that a business developer shouldn’t have to code himself. EJBs provide these services in a very simple way: either programmatically with a high level of abstraction ...
openaire +1 more source
Security of Internet Transactions
2009State-of-the-art IT facilities are ever more frequently applied in all areas of life. Nowadays, Internet connection, online resources and services are taken for granted. It is much quicker (almost immediate) and more convenient to access electronic information and use online services than to employ traditional methods.
Zygmunt Mazur +2 more
openaire +1 more source
Secure Transaction Authentication Protocol
2016A protocol for NFC mobile authentication and transaction is proposed by W. Chen et al. This protocol is used for micropayments, where the Mobile Network Operator pays for its customers. The main advantage of this protocol is its compatibility with the existing GSM network.
Pardis Pourghomi +2 more
openaire +1 more source
Securely executing multilevel transactions
1996In this paper, we show how arbitrary multilevel transactions—transactions that have the ability to read and write data at multiple levels—can be executed using the inherently secure low-first algorithm. To this end, we combine a trusted caching facility with a multiversion timestamp ordering algorithm in a manner that is both secure and yields one-copy
Sushil Jajodia +3 more
openaire +1 more source

