Sciweavers

3821 search results - page 669 / 765
» A Security Model for Aglets
Sort
View
ICDCIT
2005
Springer
15 years 10 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy
ICIAR
2005
Springer
15 years 10 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
IFIP
2005
Springer
15 years 10 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
OOPSLA
2005
Springer
15 years 10 months ago
Fine-grained interoperability through mirrors and contracts
As a value flows across the boundary between interoperating languages, it must be checked and converted to fit the types and representations of the target language. For simple f...
Kathryn E. Gray, Robert Bruce Findler, Matthew Fla...
SAFECOMP
2005
Springer
15 years 10 months ago
Safety Interfaces for Component-Based Systems
Abstract. This paper addresses the problems appearing in componentbased development of safety-critical systems. We aim at efficient reasoning about safety at system level while add...
Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea