Sciweavers

144 search results - page 15 / 29
» Dynamic Event-Based Access Control as Term Rewriting
Sort
View
CCS
2009
ACM
14 years 8 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 7 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
CCS
2007
ACM
14 years 1 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
14 years 7 months ago
Querying xml with update syntax
This paper investigates a class of transform queries proposed by XQuery Update [6]. A transform query is defined in terms of XML update syntax. When posed on an XML tree T, it ret...
Wenfei Fan, Gao Cong, Philip Bohannon
JNCA
2011
126views more  JNCA 2011»
13 years 2 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou