Sciweavers

878 search results - page 118 / 176
» A Compiler-Based Approach to Data Security
Sort
View
GRID
2007
Springer
15 years 6 months ago
Fine-grained access control for GridFTP using SecPAL
– Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. I...
Marty Humphrey, Sang-Min Park, Jun Feng, Norm Beek...
VLDB
2004
ACM
147views Database» more  VLDB 2004»
15 years 5 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 6 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
INFOCOM
2006
IEEE
15 years 5 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 3 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...