Sciweavers

XMLSEC
2003
ACM
14 years 27 days ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
XMLSEC
2003
ACM
14 years 27 days ago
RDF metadata for XML access control
ÁÒ Ø × Ô Ô Ö Û ÔÖ × ÒØ Ò ×× ÓÒØÖÓÐ Ö Ñ ÛÓÖ Ø Ø ÔÖÓÚ × ­ Ü Ð × ÙÖ ØÝ Ö ÒÙÐ Ö ØÝ ÓÖ ÅÄ Ó ÙÑ ÒØ׺ Ê ×Ø Ø Ñ ÒØ× Ö ...
Vaibhav Gowadia, Csilla Farkas
XMLSEC
2003
ACM
14 years 27 days ago
An XML-based approach to combine firewalls and web services security specifications
Marco Cremonini, Sabrina De Capitani di Vimercati,...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 27 days ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
14 years 27 days ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
SP
2003
IEEE
14 years 27 days ago
Hardening Functions for Large Scale Distributed Computations
Many recent large-scale distributed computing applications utilize spare processor cycles of personal computers that are connected to the Internet. The resulting distributed compu...
Doug Szajda, Barry G. Lawson, Jason Owen
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 27 days ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 27 days ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...