Sciweavers

1843 search results - page 11 / 369
» Securing Class Initialization
Sort
View
DBSEC
2006
144views Database» more  DBSEC 2006»
13 years 8 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
SIAMMA
2010
86views more  SIAMMA 2010»
13 years 2 months ago
Spreading Speeds for Some Reaction-Diffusion Equations with General Initial Conditions
This paper is devoted to the study of some qualitative and quantitative aspects of nonlinear propagation phenomena in diffusive media. More precisely, we consider the case a react...
François Hamel, Yannick Sire
ACSAC
2005
IEEE
14 years 1 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
13 years 8 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
14 years 1 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur