Sciweavers

867 search results - page 77 / 174
» Secure Input for Web Applications
Sort
View
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 10 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
CIC
2006
124views Communications» more  CIC 2006»
13 years 10 months ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
GIS
2008
ACM
13 years 10 months ago
DRM policies for web map service
Open Digital Rights Language (ODRL) is an extensible language for specifying Rights Policy in the context of Digital Rights Management (DRM) applications. The OpenGIS® Web Map Se...
Alban Gabillon, Patrick Capolsini
TACAS
2010
Springer
245views Algorithms» more  TACAS 2010»
14 years 4 months ago
Stranger: An Automata-Based String Analysis Tool for PHP
STRANGER is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. STRANGER uses symbolic forward and back...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
AOSD
2009
ACM
14 years 3 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter