Sciweavers

18 search results - page 1 / 4
» Information Security - The Fourth Wave
Sort
View
COMPSEC
2006
139views more  COMPSEC 2006»
14 years 10 months ago
Information Security - The Fourth Wave
Sebastiaan H. von Solms
OOPSLA
1989
Springer
15 years 2 months ago
A Denotational Semantics of Inheritance and its Correctness
This paper presents a denotational model of inheritance. The model is based on an intuitive motivation of inheritance as a mechanism for deriving modified versions of recursive d...
William R. Cook, Jens Palsberg
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
WCCE
2001
105views Education» more  WCCE 2001»
14 years 11 months ago
Designing an IT College
: The University of the United Arab Emirates (UAEU) commissioned an international panel of experts to devise a model curriculum for their new College of Information Technology. The...
Peter J. Denning, Ravi Athale, Nada Dabbagh, Danie...
WWW
2007
ACM
15 years 10 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang