Sciweavers

1403 search results - page 131 / 281
» Security Model for XML Data
Sort
View
COOPIS
2004
IEEE
14 years 2 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
BCS
2008
13 years 11 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
B
2007
Springer
14 years 2 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
ACSAC
2010
IEEE
13 years 8 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
CAISE
2006
Springer
14 years 2 months ago
Supporting Customised Collaboration over Shared Document Repositories
The development of collaborative environments that not only manage information and communication, but also support the actual work processes of organisations is very important. XML...
Claudia-Lavinia Ignat, Moira C. Norrie