Sciweavers

3003 search results - page 516 / 601
» Software Security: Building Security In
Sort
View
SIGECOM
2000
ACM
147views ECommerce» more  SIGECOM 2000»
14 years 1 months ago
MultECommerce: a distributed architecture for collaborative shopping on the WWW
The WWW has made information and services more available than ever before. Many of the first Web applications have been emulations of real world activities, in particular, e-comme...
Stefano Puglia, Robert Carter, Ravi Jain
ICEIS
1999
IEEE
14 years 1 months ago
A New Method to Block Access to Illegal and Harmful Content on the Internet
: Filtering software is the most commonly used to protect children and young people from illegal and harmful contents on the Internet. Most of this software blocks access to Intern...
Byung-Jeon Yoo, Hyun-Gyoo Yook, Myong-Soon Park
ICALP
1999
Springer
14 years 1 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli
COMPSAC
1998
IEEE
14 years 1 months ago
Capability-Based Protection for Integral Object-Oriented Systems
Protection is an essential issue for the kind of heterogeneous distributed interoperable object environments, which Java and CORBA are a glimpse of. A uniform protection mechanism...
María Ángeles Díaz Fond&oacut...
COMPSAC
2007
IEEE
14 years 22 days ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie