Sciweavers

123 search results - page 15 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
15 years 12 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
SCA
2007
15 years 2 months ago
Arbitrary cutting of deformable tetrahedralized objects
We propose a flexible geometric algorithm for placing arbitrary cracks and incisions on tetrahedralized deformable objects. Although techniques based on remeshing can also accomm...
Eftychios Sifakis, Kevin G. Der, Ronald Fedkiw
CORR
2006
Springer
169views Education» more  CORR 2006»
14 years 11 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
RAID
2001
Springer
15 years 4 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
WEBI
2004
Springer
15 years 5 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen