Sciweavers

881 search results - page 45 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 9 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 7 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
MMMACNS
2005
Springer
14 years 3 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
CSREASAM
2006
13 years 11 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
CCS
2007
ACM
14 years 3 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment