Sciweavers

2486 search results - page 138 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
PODS
2010
ACM
249views Database» more  PODS 2010»
14 years 2 months ago
Semantic query optimization in the presence of types
Both semantic and type-based query optimization rely on the idea that queries often exhibit non-trivial rewritings if the state space of the database is restricted. Despite their ...
Michael Meier 0002, Michael Schmidt, Fang Wei, Geo...
SAC
2010
ACM
13 years 7 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
ECIS
2004
13 years 10 months ago
A study of information systems outsourcing risks
Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the ...
Reyes-G. Gonzalez, Jose Gasco, Juan Llopis
ICALP
2003
Springer
14 years 2 months ago
Resource Access and Mobility Control with Dynamic Privileges Acquisition
µKlaim is a process language that permits programming distributed systems made up of several mobile components interacting through multiple distributed tuple spaces. We present th...
Daniele Gorla, Rosario Pugliese
IEEEIAS
2009
IEEE
13 years 6 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian