Sciweavers

1081 search results - page 127 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
DEXA
2006
Springer
181views Database» more  DEXA 2006»
14 years 15 days ago
Argumentation for Decision Support
In this paper we describe an application based on a general approach towards modelling practical reasoning through defeasible argumentation. The purpose of the paper is to show how...
Katie Atkinson, Trevor J. M. Bench-Capon, Sanjay M...
WPES
2003
ACM
14 years 2 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
SACMAT
2003
ACM
14 years 2 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
SIS
2004
13 years 10 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
ICSE
2000
IEEE-ACM
14 years 12 days ago
Software engineering and middleware: a roadmap
The construction of a large class of distributed systems can be simplified by leveraging middleware, which is layered between network operating systems and application components....
Wolfgang Emmerich