Sciweavers

631 search results - page 7 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
CADE
2008
Springer
14 years 7 months ago
Integration of the TPTPWorld into SigmaKEE
This paper describes the integration of the ATP support of the TPTPWorld into the Sigma Knowledge Engineering Environment. The result is an interactive knowledge based reasoning en...
Steven Trac, Geoff Sutcliffe, Adam Pease
ACSAC
2008
IEEE
14 years 2 months ago
OMOS: A Framework for Secure Communication in Mashup Applications
Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous data sources into one integrated browser environment. The hallmark of these appli...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
IH
2001
Springer
13 years 12 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
CODASPY
2012
12 years 3 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...