Sciweavers

1795 search results - page 59 / 359
» Security Models and Information Flow
Sort
View
DAWAK
2009
Springer
14 years 1 months ago
Visual Modelling of Data Warehousing Flows with UML Profiles
Data warehousing involves complex processes that transform source data through several stages to deliver suitable information ready to be analysed. Though many techniques for visua...
Jesús Pardillo, Matteo Golfarelli, Stefano ...
ISCC
2006
IEEE
128views Communications» more  ISCC 2006»
14 years 3 months ago
Adjacent 2-Route Flow Approach for Restorable Dynamic Routing in MPLS Networks
In this paper we focus on issues of restorable dynamic routing in MPLS networks. We assume that the considered MPLS network must provide reliable service including restorable rout...
Krzysztof Walkowiak
CCS
2008
ACM
13 years 11 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
CCS
2006
ACM
14 years 1 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
MMM
2007
Springer
105views Multimedia» more  MMM 2007»
14 years 3 months ago
Discovering User Information Goals with Semantic Website Media Modeling
In this work we present an approach to capture the total semantics in multimedia-multimodal web pages. Our research improves upon the state-ofthe-art with two key features: (1) cap...
Bibek Dev Bhattarai, Mike Wong, Rahul Singh