SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Hedbom Hans) "

Sökning: WFRF:(Hedbom Hans)

  • Resultat 1-10 av 31
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Fischer Hübner, Simone, et al. (författare)
  • Benefits of Privacy-Enhancing Identity Management
  • 2008
  • Ingår i: Asia-Pacific Business Review. - : SAGE Publications. - 0973-2470. ; 4:4, s. 36-52
  • Tidskriftsartikel (refereegranskat)abstract
    • Privacy-enhancing identity management systems allow users to act securely in the information society while keeping sovereignty over their personal spheres. This paper elaborates the benefits that privacy-enhancing identity management can provide for both end users and services sides. These benefits include increased privacy protection for end users and enhanced trust relations between users and services sides. The PRIME system developed within the EU project PRIME (Privacy and Identity Management for Europe) and a PRIME-enable e-shopping application scenario are used to illustrate these benefits. Besides, also potential business drivers for services sides to deploy privacy-enhancing identity management systems are discussed.
  •  
3.
  • Fischer Hübner, Simone, et al. (författare)
  • PRIME Framework V3
  • 2008
  • Rapport (refereegranskat)
  •  
4.
  • Fischer Hübner, Simone, 1963-, et al. (författare)
  • RFID : Radio Frequency Identification
  • 2009
  • Ingår i: The Future of Identity in the Information Society. - Heidelberg : Springer. - 9783540884804
  • Bokkapitel (refereegranskat)
  •  
5.
  • Fischer Hübner, Simone, 1963-, et al. (författare)
  • Technik fuer mehr Transparenz
  • 2010
  • Ingår i: digma - Zeitschrift für Datenrecht und Informationssicherheit. - Zuerich : Schulthess. - 1424-9944. ; 10:1, s. 34-37
  • Tidskriftsartikel (refereegranskat)
  •  
6.
  • Fischer-Hübner, Simone, 1963-, et al. (författare)
  • Trust and Assurance HCI
  • 2011
  • Ingår i: Privacy and Identity Management for Life. - Berlin : Springer Berlin/Heidelberg. - 9783642203169 ; , s. 245-260
  • Bokkapitel (refereegranskat)
  •  
7.
  • Hedbom, Hans, et al. (författare)
  • A Comparison of the Security of Windows NT and UNIX
  • 1998
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents a brief comparison of two operating systems, Windows NT and UNIX. The comparison covers two different aspects. First, we compare the main security features of the two operating systems and then we make a comparison of a selection of vulnerabilities most of which we know have been used for making real intrusions. We found that Windows NT has slightly more rigorous security features than standard UNIX but the two systems display similar vulnerabilities. The conclusion is that there are no significant differences in the real level of security between these systems
  •  
8.
  • Hedbom, Hans, et al. (författare)
  • A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT
  • 1997
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we present a preliminary evaluation of the security of a non-distributed version of Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. Thus the architecture and security mechanisms of Windows NT have been studied. Furthermore, the paper contains a few examples of successful intrusions on the target system, which was a standard personal computer with Windows NT Workstation 3.51 and one with NT Workstation 4.0, both working in a stand-alone mode. We have also found some evidence that other, more severe security flaws exist in the system
  •  
9.
  • Hedbom, Hans, et al. (författare)
  • A Security Evaluation of a Non-Distributed Version of Windows NT
  • 1997
  • Rapport (refereegranskat)abstract
    • In this paper we present an evaluation of the security in Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. To investigate the latter, the authors, have adopted the role of attackers. This paper contains results from several attempts to violate the security of Windows NT. In some cases, the attempts were successful, meaning that we gained access to information or resources that should be protected. The target systems were standard personal computers with Windows NT Workstation 3.51 and Windows NT Workstation 4.0 respectively, both working in stand-alone mode
  •  
10.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 31

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy