Sciweavers

5488 search results - page 1029 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
VRML
2000
ACM
15 years 8 months ago
3D gadgets for business process visualization - a case study
Business visualization is becoming increasingly important, since managers recognize the power of human visual intuition in information-rich decision tasks. Nevertheless, despite i...
Bastiaan Schönhage, Alex van Ballegooij, Anto...
PODS
1999
ACM
95views Database» more  PODS 1999»
15 years 8 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...
POPL
1999
ACM
15 years 8 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
15 years 8 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara
SIGMOD
1999
ACM
107views Database» more  SIGMOD 1999»
15 years 8 months ago
Client-Site Query Extensions
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Tobias Mayr, Praveen Seshadri
« Prev « First page 1029 / 1098 Last » Next »