Sciweavers

516 search results - page 46 / 104
» Comparing Two Information Flow Security Properties
Sort
View
DSN
2004
IEEE
14 years 18 days ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
IEEEIAS
2009
IEEE
13 years 6 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
ISTA
2007
13 years 10 months ago
Resolving Indifferences in Multiple Attribute Business Information System Selection with Social Choice Methods
: The evaluation of Information Systems (IS) is a critical process for the successful development of any organizational IT capability. An important class of decision making techniq...
Edward Bernroider, Johann Mitlöhner
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
MMS
2006
13 years 8 months ago
Information assimilation framework for event detection in multimedia surveillance systems
Most multimedia surveillance and monitoring systems nowadays utilize multiple types of sensors to detect events of interest as and when they occur in the environment. However, due...
Pradeep K. Atrey, Mohan S. Kankanhalli, Ramesh Jai...