Sciweavers

81 search results - page 14 / 17
» Verifiable Identifiers in Middleware Security
Sort
View
ICDE
2009
IEEE
129views Database» more  ICDE 2009»
14 years 2 months ago
A Static Analysis Framework for Database Applications
—Database developers today use data access APIs such as ADO.NET to execute SQL queries from their application. These applications often have security problems such as SQL injecti...
Arjun Dasgupta, Vivek R. Narasayya, Manoj Syamala
JSA
2006
94views more  JSA 2006»
13 years 7 months ago
An abstraction model for a Grid execution framework
action Model for a Grid Execution Framework Kaizar Amin,c,a Gregor von Laszewski,,a,b Mihael Hategan,b,a Rashid Al-Ali,d Omer Rana,d and David Walkerc aArgonne National Laboratory,...
Kaizar Amin, Gregor von Laszewski, Mihael Hategan,...
ATAL
2005
Springer
14 years 1 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
TIFS
2008
145views more  TIFS 2008»
13 years 7 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
JDCTA
2010
143views more  JDCTA 2010»
13 years 2 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali