Sciweavers

3452 search results - page 496 / 691
» Secure Data Outsourcing
Sort
View
ESORICS
2004
Springer
15 years 10 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
MIDDLEWARE
2004
Springer
15 years 10 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
PET
2004
Springer
15 years 10 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
SDMW
2004
Springer
15 years 10 months ago
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms
Abstract. Due to the growing interest in XML security, various access control schemes have been proposed recently. However, little effort has been put forth to facilitate a unifor...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
UIALL
2004
Springer
15 years 10 months ago
Multimodal Interaction in Architectural Design Applications
In this paper we report on ongoing experiments with an advanced multimodal system for applications in architectural design. The system supports uninformed users in entering the rel...
Lou Boves, Andre Neumann, Louis Vuurpijl, Louis te...