Sciweavers

2504 search results - page 31 / 501
» Enterprise Security Architecture
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...
MIDDLEWARE
2004
Springer
15 years 5 months ago
Alternative Edge-Server Architectures for Enterprise JavaBeans Applications
Abstract. Edge-server architectures are widely used to improve webapplication performance for non-transactional data. However, their use with transactional data is complicated by t...
Avraham Leff, James T. Rayfield
CSFW
1999
IEEE
15 years 4 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
ACSW
2003
15 years 1 months ago
Flexible Enterprise Access Control with Object-oriented View Specification
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Mark Evered