Sciweavers

1323 search results - page 113 / 265
» Updatable Security Views
Sort
View
109
Voted
DKE
1999
87views more  DKE 1999»
15 years 2 months ago
Logical Foundations of Multilevel Databases
In this paper, we propose a formal model for multilevel databases. This model aims at being a generic model, that is it can be interpreted for any kind of database (relational, ob...
Frédéric Cuppens, Alban Gabillon
WWW
2005
ACM
16 years 3 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
STORAGESS
2006
ACM
15 years 8 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
124
Voted
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 7 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
COMPSEC
2010
124views more  COMPSEC 2010»
15 years 2 months ago
Runtime monitoring for next generation Java ME platform
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...