Sciweavers

2386 search results - page 181 / 478
» Database Security 2000
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
15 years 2 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
CN
2000
76views more  CN 2000»
14 years 10 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
WER
2000
Springer
15 years 2 months ago
O Uso do Framework NFR no Projeto de Banco de Dados
Distributed database design is a complex process that involves a set of distinct aspects for the accomplishment of an adequate data distribution (Buretta 1997). Many of these aspec...
Márcia Santos, Maria Lencastre, Jaelson Bre...
DSN
2000
IEEE
15 years 2 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
ICDE
2008
IEEE
165views Database» more  ICDE 2008»
15 years 4 months ago
Semantic Web and firewall alignment
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Simon N. Foley, William M. Fitzgerald