Sciweavers

234 search results - page 36 / 47
» Evolving Messaging Systems for Secure Role Based Messaging
Sort
View
CCS
2005
ACM
14 years 1 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
ICCSA
2011
Springer
12 years 11 months ago
Integration of ePortfolios in Learning Management Systems
The LMS plays a decisive role in most eLearning environments. Although they integrate many useful tools for managing eLearning activities, they must also be effectively integrated ...
Ricardo Queirós, Lino Oliveira, José...
DBSEC
2003
157views Database» more  DBSEC 2003»
13 years 9 months ago
Systematic Development of a Family of Fair Exchange Protocols
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
IDTRUST
2009
ACM
14 years 2 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
ISSA
2004
13 years 9 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee