Sciweavers

155 search results - page 18 / 31
» Flexible Aliasing with Protection
Sort
View
IDTRUST
2010
ACM
14 years 2 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
CRITIS
2007
13 years 9 months ago
Detecting DNS Amplification Attacks
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Georgios Kambourakis, Tassos Moschos, Dimitris Gen...
ICWS
2007
IEEE
13 years 9 months ago
Guarding Sensitive Information Streams through the Jungle of Composite Web Services
Complex and dynamic web service compositions may introduce unpredictable and unintentional sharing of security-sensitive data (e.g., credit card numbers) as well as unexpected vul...
Jinpeng Wei, Lenin Singaravelu, Calton Pu
IASTEDSEA
2004
13 years 9 months ago
Instance orientation: A programming methodology
Instance orientation is an approach for designing and programming software systems. It addresses a limitation of current software architectures: it allows multiple higherlevel vie...
Thomas Schöbel-Theuer
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 8 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese