Sciweavers

1795 search results - page 119 / 359
» Security Models and Information Flow
Sort
View
113
Voted
WWW
2008
ACM
16 years 4 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
125
Voted
FDL
2005
IEEE
15 years 9 months ago
Incorporating SystemC in Analog/Mixed-Signal Design Flow
In today’s flows, there is still a gap between system level description and hardware implementation, especially for analog/RF building blocks. SystemC-AMS or co-simulations have...
Patrick Birrer, Walter Hartong
126
Voted
ASWC
2006
Springer
15 years 5 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
141
Voted
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 3 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
131
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...