Sciweavers

12637 search results - page 232 / 2528
» Security for Extensible Systems
Sort
View
110
Voted
CAISE
2003
Springer
15 years 7 months ago
SIM-Filter: User Profile based Smart Information Filtering and Personalization in Smartcard
The emergence of new information and communication system technologies allow the appearance of new techniques of data processing. Thus, it is increasingly difficult to user to find...
Abdelkrim Lahlou, Pascal Urien
109
Voted
USENIX
2003
15 years 4 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
87
Voted
ICIP
1998
IEEE
16 years 4 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
117
Voted
TCC
2004
Springer
118views Cryptology» more  TCC 2004»
15 years 8 months ago
A General Composition Theorem for Secure Reactive Systems
Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography...
Michael Backes, Birgit Pfitzmann, Michael Waidner
144
Voted
BNCOD
2003
150views Database» more  BNCOD 2003»
15 years 4 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray