Sciweavers

ACJ
2006
58views more  ACJ 2006»
13 years 3 months ago
Cooperative Defence Against DDoS Attacks
Guangsen Zhang, Manish Parashar
ACJ
2006
57views more  ACJ 2006»
13 years 3 months ago
An Attribute-Based Delegation Model and Its Extension
Chunxiao Ye, Zhongfu Wu, Yunqing Fu
ACJ
2006
117views more  ACJ 2006»
13 years 3 months ago
A UML 2.0/OCL Extension for Designing Secure Data Warehouses
Rodolfo Villarroel, Eduardo Fernández-Medin...
ACJ
2006
105views more  ACJ 2006»
13 years 3 months ago
Return On Security Investment (ROSI) - A Practical Quantitative Modell
Wes Sonnenreich, Jason Albanese, Bruce Stout
ACJ
2006
59views more  ACJ 2006»
13 years 3 months ago
Towards a Process for Web Services Security
Carlos Gutiérrez, Eduardo Fernández-...
ACJ
2006
85views more  ACJ 2006»
13 years 3 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
ACJ
2006
67views more  ACJ 2006»
13 years 3 months ago
Controlled Sharing of Personal Content Using Digital Rights Management
Claudine Conrado, Milan Petkovic, Michiel van der ...
ACJ
2006
47views more  ACJ 2006»
13 years 3 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...