Sciweavers

5475 search results - page 1019 / 1095
» Model Driven Security
Sort
View
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 10 days ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
139
Voted
ICIP
2003
IEEE
16 years 2 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo
124
Voted
VIS
2004
IEEE
115views Visualization» more  VIS 2004»
16 years 1 months ago
Visualization in Grid Computing Environments
Grid computing provides a challenge for visualization system designers. In this research, we evolve the dataflow concept to allow parts of the visualization process to be executed...
Ken Brodlie, David A. Duce, Julian R. Gallop, Musb...
110
Voted
WWW
2009
ACM
16 years 1 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
WWW
2008
ACM
16 years 1 months ago
Compoweb: a component-oriented web architecture
In this paper, client-site Web mashups are studied from component-oriented perspective, and CompoWeb, a componentoriented Web architecture, is proposed. In CompoWeb, a Web applica...
Rui Guo, Bin B. Zhu, Min Feng 0002, Aimin Pan, Bos...
« Prev « First page 1019 / 1095 Last » Next »