Sciweavers

169 search results - page 22 / 34
» Security policy analysis using deductive spreadsheets
Sort
View
SDMW
2009
Springer
14 years 1 months ago
Controlling Access to XML Documents over XML Native and Relational Databases
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 1 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 1 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
WPES
2005
ACM
14 years 29 days ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk