Sciweavers

804 search results - page 137 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
HPDC
2010
IEEE
15 years 5 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
15 years 5 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
CCS
2010
ACM
15 years 4 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
146
Voted
WISEC
2010
ACM
15 years 4 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
NAR
2008
87views more  NAR 2008»
15 years 4 months ago
The CGView Server: a comparative genomics tool for circular genomes
The CGView Server generates graphical maps of circular genomes that show sequence features, base composition plots, analysis results and sequence similarity plots. Sequences can b...
Jason R. Grant, Paul Stothard