Sciweavers

76 search results - page 4 / 16
» A Systematic Approach to Static Access Control
Sort
View
ER
2001
Springer
148views Database» more  ER 2001»
13 years 12 months ago
On the Automatic Extraction of Data from the Hidden Web
An increasing amount of Web data is accessible only by filling out HTML forms to query an underlying data source. While this is most welcome from a user perspective (queries are e...
Stephen W. Liddle, Sai Ho Yau, David W. Embley
INFOCOM
2006
IEEE
14 years 1 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
IEEEARES
2008
IEEE
14 years 1 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
SACMAT
2003
ACM
14 years 22 days ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
ESSOS
2010
Springer
14 years 4 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger