Sciweavers

12637 search results - page 113 / 2528
» Security for Extensible Systems
Sort
View
FI
2011
96views more  FI 2011»
13 years 4 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
VLDB
1991
ACM
113views Database» more  VLDB 1991»
14 years 17 days ago
Implementing Set-Oriented Production Rules as an Extension to Starburst
This paper describes the implementation of a set-oriented database production rule language proposed in earlier papers. Our implementation uses the extensibility features of the St...
Jennifer Widom, Roberta Cochrane, Bruce G. Lindsay
SEC
2004
13 years 10 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
UML
1999
Springer
14 years 1 months ago
Towards a UML Extension for Hypermedia Design
Abstract. The acceptance of UML as a de facto standard for the design of object-oriented systems, together with the explosive growth of the World Wide Web has raised the need for U...
Hubert Baumeister, Nora Koch, Luis Mandel
LISA
2004
13 years 10 months ago
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
Spyware is a rapidly spreading problem for PC users causing significant impact on system stability and privacy concerns. It attaches to extensibility points in the system to ensur...
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron...