Sciweavers

1795 search results - page 293 / 359
» Security Models and Information Flow
Sort
View
125
Voted
CCS
2005
ACM
15 years 9 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis
188
Voted
OOPSLA
2001
Springer
15 years 8 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
128
Voted
AGENTS
1998
Springer
15 years 7 months ago
WebMate: A Personal Agent for Browsing and Searching
The World-Wide Web is developing very fast. Currently, nding useful information on the Web is a time consuming process. In this paper, we present WebMate, an agent that helps user...
Liren Chen, Katia P. Sycara
127
Voted
CAISE
2010
Springer
15 years 3 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
159
Voted
ICITS
2009
15 years 1 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...