Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
6
click to vote
ACJ
2006
58
views
more
ACJ 2006
»
Cooperative Defence Against DDoS Attacks
13 years 3 months ago
Download
www.jrpit.acs.org.au
Guangsen Zhang, Manish Parashar
claim paper
Read More »
5
click to vote
ACJ
2006
57
views
more
ACJ 2006
»
An Attribute-Based Delegation Model and Its Extension
13 years 3 months ago
Download
www.jrpit.acs.org.au
Chunxiao Ye, Zhongfu Wu, Yunqing Fu
claim paper
Read More »
4
click to vote
ACJ
2006
117
views
more
ACJ 2006
»
A UML 2.0/OCL Extension for Designing Secure Data Warehouses
13 years 3 months ago
Download
www.jrpit.acs.org.au
Rodolfo Villarroel, Eduardo Fernández-Medin...
claim paper
Read More »
8
click to vote
ACJ
2006
105
views
more
ACJ 2006
»
Return On Security Investment (ROSI) - A Practical Quantitative Modell
13 years 3 months ago
Download
www.jrpit.acs.org.au
Wes Sonnenreich, Jason Albanese, Bruce Stout
claim paper
Read More »
4
click to vote
ACJ
2006
86
views
more
ACJ 2006
»
Analysing the Woo-Lam Protocol Using CSP and Rank Functions
13 years 3 months ago
Download
www.jrpit.acs.org.au
Siraj A. Shaikh, Vicky J. Bush
claim paper
Read More »
4
click to vote
ACJ
2006
59
views
more
ACJ 2006
»
Towards a Process for Web Services Security
13 years 3 months ago
Download
www.jrpit.acs.org.au
Carlos Gutiérrez, Eduardo Fernández-...
claim paper
Read More »
7
click to vote
ACJ
2006
85
views
more
ACJ 2006
»
Tree Automata for Schema-Level Filtering of XML Associations
13 years 3 months ago
Download
www.cse.sc.edu
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
claim paper
Read More »
6
click to vote
ACJ
2006
67
views
more
ACJ 2006
»
Controlled Sharing of Personal Content Using Digital Rights Management
13 years 3 months ago
Download
www.jrpit.acs.org.au
Claudine Conrado, Milan Petkovic, Michiel van der ...
claim paper
Read More »
7
click to vote
ACJ
2006
47
views
more
ACJ 2006
»
Securing UML Information Flow Using FlowUML
13 years 3 months ago
Download
www.jrpit.acs.org.au
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
claim paper
Read More »