Sciweavers

2207 search results - page 375 / 442
» Security at the Internet Layer
Sort
View
ADBIS
2010
Springer
154views Database» more  ADBIS 2010»
15 years 6 months ago
Platform Independent Database Replication Solution Applied to Medical Information System
Medical Information Systems (MIS) in general, like any other complex and large system, can be based on centralized or distributed DBMS. Centralized system is much easier for implem...
Tatjana Stankovic, Srebrenko Pesic, Dragan Jankovi...
JUCS
2007
152views more  JUCS 2007»
15 years 4 months ago
The SEWASIE Network of Mediator Agents for Semantic Search
: Integration of heterogeneous information in the context of Internet becomes a key activity to enable a more organized and semantically meaningful access to data sources. As Inter...
Domenico Beneventano, Sonia Bergamaschi, Francesco...
ICSE
2008
IEEE-ACM
16 years 4 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
ISW
2009
Springer
15 years 11 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
ISW
2004
Springer
15 years 9 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner