Sciweavers

2057 search results - page 38 / 412
» Distributed Secure Systems: Then and Now
Sort
View
CSFW
1999
IEEE
14 years 3 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
WWW
2010
ACM
14 years 6 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
DBSEC
2000
110views Database» more  DBSEC 2000»
14 years 10 days ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
IPPS
1999
IEEE
14 years 3 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
NDSS
2000
IEEE
14 years 3 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...