Sciweavers

3420 search results - page 96 / 684
» A Language-Based Approach to Security
Sort
View
157
Voted
DBSEC
2006
144views Database» more  DBSEC 2006»
15 years 5 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 3 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
127
Voted
DAGSTUHL
2006
15 years 5 months ago
A Cross-Language Approach to Historic Document Retrieval
Our cultural heritage, as preserved in libraries, archives and museums, is made up of documents written many centuries ago. Largescale digitization initiatives make these documents...
Jaap Kamps, Marijn Koolen, Frans Adriaans, Maarten...
ACSAC
2009
IEEE
15 years 10 months ago
Computer-Related Risk Futures
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Peter G. Neumann
126
Voted
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
15 years 9 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...