Sciweavers

4731 search results - page 137 / 947
» Securing Interactive Programs
Sort
View
AOSD
2010
ACM
14 years 2 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
ISBRA
2009
Springer
14 years 3 months ago
Querying Protein-Protein Interaction Networks
Recent techniques increase the amount of our knowledge of interactions between proteins. To filter, interpret and organize this data, many authors have provided tools for querying...
Guillaume Blin, Florian Sikora, Stéphane Vi...
IFIP
1992
Springer
14 years 1 months ago
Structuring the Space of Interactive System Properties
We provide a structured classification of properties to guide the principled design of interactive systems. This classification is motivated by an existing software quality framew...
Gregory D. Abowd, Joëlle Coutaz, Laurence Nig...
ISSA
2008
13 years 10 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
DBSEC
2000
95views Database» more  DBSEC 2000»
13 years 10 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes