Sciweavers

831 search results - page 125 / 167
» A Security Concept for OLAP
Sort
View
POLICY
2005
Springer
14 years 3 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
AOSD
2004
ACM
14 years 3 months ago
What are the key issues for commercial AOP use: how does AspectWerkz address them?
AspectWerkz is a framework targeted towards dynamic aspectoriented programming (AOP) in commercial applications. Based on our experience designing and supporting AspectWerkz, we h...
Jonas Bonér
ASIACRYPT
2004
Springer
14 years 3 months ago
Higher Order Universal One-Way Hash Functions
Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from ...
Deukjo Hong, Bart Preneel, Sangjin Lee
ISI
2004
Springer
14 years 3 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
ISW
2004
Springer
14 years 3 months ago
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a si...
Mark Foster, Joseph N. Wilson, Shigang Chen