Sciweavers

330 search results - page 39 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
POPL
2008
ACM
16 years 2 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
APSEC
2003
IEEE
15 years 7 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
DGO
2009
111views Education» more  DGO 2009»
15 years 3 months ago
"Integrated" and "transcendent" e-government: keys for analyzing organizational structure and governance
As e-government enters the "transformation" phase, public authorities face major challenges in terms of governance and leadership. The present article consolidates prior...
Beat Estermann, Reinhard Riedl, Alessia C. Neuroni
DBISP2P
2003
Springer
92views Database» more  DBISP2P 2003»
15 years 7 months ago
Semantic Overlay Clusters within Super-Peer Networks
When joining information provider peers to a peer-to-peer network, an arbitrary distribution is sub-optimal. In fact, clustering peers by their characteristics, enhances search and...
Alexander Löser, Felix Naumann, Wolf Siberski...
CORR
2008
Springer
88views Education» more  CORR 2008»
15 years 2 months ago
The Korrontea Data Modeling
Needs of multimedia systems evolved due to the evolution of their architecture which is now distributed into heterogeneous contexts. A critical issue lies in the fact that they ha...
Emmanuel Bouix, Philippe Roose, Marc Dalmau