Sciweavers

2386 search results - page 84 / 478
» Database Security 2000
Sort
View
JMLC
2000
Springer
15 years 1 months ago
Derivation of Secure Parallel Applications by Means of Module Embedding
An enhancement to modular languages called module embedding facilitates the development and utilization of secure generic parallel algorithms.
Atanas Radenski
CCS
2007
ACM
15 years 4 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
DEXAW
2000
IEEE
132views Database» more  DEXAW 2000»
15 years 1 months ago
On Integrating Mobile Devices into a Workflow Management Scenario
While the desire to gain full access to stationary information sources (e.g. the company
Stefan Müller-Wilken, Frank Wienberg, Winfrie...
CN
2000
72views more  CN 2000»
14 years 9 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
CORR
2000
Springer
87views Education» more  CORR 2000»
14 years 9 months ago
Security Policy Consistency
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Pau...