Sciweavers

1757 search results - page 22 / 352
» Secure Content Validation
Sort
View
SBBD
2007
179views Database» more  SBBD 2007»
13 years 8 months ago
Assisting XML Schema Evolution that Preserves Validity
Abstract. We consider the problem of XML schema evolution preserving the validity of existing documents related to the original schema. The aim of such schema evolution is to fit ...
Béatrice Bouchou, Denio Duarte
CASES
2010
ACM
13 years 5 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
14 years 1 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CAI
2006
Springer
13 years 7 months ago
Addressing the Conflicting Dimension of Groupware: A Case Study in Software Requirements Validation
This paper addresses the conflicting dimension of groupware, seeking the reconciliation of two very different assumptions about the users' attitudes using groupware tools: use...
Pedro Antunes, João Ramires, Ana Resp&iacut...
ICPR
2008
IEEE
14 years 8 months ago
Attention-based video reframing: Validation using eye-tracking
Watching TV shows on cell phones is starting to become a reality. Nevertheless, there still exist some significant issues due to the small size of cell phone screens. The direct t...
Christel Chamaret, Olivier Le Meur