Sciweavers

5488 search results - page 979 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
OSDI
1994
ACM
15 years 6 months ago
Metadata Update Performance in File Systems
Structural changes, such as file creation and block allocation, have consistently been identified as file system performance problems in many user environments. We compare several...
Gregory R. Ganger, Yale N. Patt
CORR
2008
Springer
111views Education» more  CORR 2008»
15 years 4 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
15 years 4 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 4 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
JCS
2008
69views more  JCS 2008»
15 years 4 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove