Sciweavers

6434 search results - page 1100 / 1287
» Model Transformations with Reference Models
Sort
View
SIGSOFT
2002
ACM
16 years 4 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
123
Voted
WWW
2007
ACM
16 years 4 months ago
Explorations in the use of semantic web technologies for product information management
Master data refers to core business entities a company uses repeatedly across many business processes and systems (such as lists or hierarchies of customers, suppliers, accounts, ...
Chen Wang, Daniel C. Wolfson, Jean-Sébastie...
PODC
2009
ACM
16 years 3 months ago
Oblivious interference scheduling
In the interference scheduling problem, one is given a set of n communication requests described by pairs of points from a metric space. The points correspond to devices in a wire...
Alexander Fanghänel, Berthold Vöcking, H...
127
Voted
STOC
2004
ACM
153views Algorithms» more  STOC 2004»
16 years 3 months ago
Bounded-concurrent secure multi-party computation with a dishonest majority
We show how to securely realize any multi-party functionality in a way that preserves security under an a-priori bounded number of concurrent executions, regardless of the number ...
Rafael Pass
241
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 3 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
« Prev « First page 1100 / 1287 Last » Next »