Sciweavers

573 search results - page 29 / 115
» The Policy Machine for Security Policy Management
Sort
View
WWW
2007
ACM
14 years 9 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks
SWS
2004
ACM
14 years 2 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley
CNSR
2005
IEEE
14 years 2 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
CPA
1995
143views Cryptology» more  CPA 1995»
14 years 16 days ago
Crypto in Europe - Markets, Law and Policy
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Ross J. Anderson
AAAI
2010
13 years 10 months ago
Evolving Compiler Heuristics to Manage Communication and Contention
As computer architectures become increasingly complex, hand-tuning compiler heuristics becomes increasingly tedious and time consuming for compiler developers. This paper presents...
Matthew E. Taylor, Katherine E. Coons, Behnam Roba...