Sciweavers

3420 search results - page 510 / 684
» A Language-Based Approach to Security
Sort
View
ICDCIT
2004
Springer
15 years 10 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner
PDCAT
2004
Springer
15 years 10 months ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
CIKM
2003
Springer
15 years 10 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
ECOOP
2000
Springer
15 years 9 months ago
Runtime Support for Type-Safe Dynamic Java Classes
Modern software must evolve in response to changing conditions. In the most widely used programming environments, code is static and cannot change at runtime. This poses problems ...
Scott Malabarba, Raju Pandey, Jeff Gragg, Earl T. ...
ICALP
1999
Springer
15 years 9 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli