Sciweavers

434 search results - page 80 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
14 years 7 months ago
Exchanging Intensional XML Data
XML is becoming the universal format for data exchange between applications. Recently, the emergence of Web services as standard means of publishing and accessing data on the Web ...
Tova Milo, Serge Abiteboul, Bernd Amann, Omar Benj...
INFOCOM
2009
IEEE
14 years 2 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
EDO
2005
Springer
14 years 1 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
13 years 12 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
PODS
1999
ACM
95views Database» more  PODS 1999»
13 years 12 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...