Sciweavers

2979 search results - page 510 / 596
» Modelling secure multiagent systems
Sort
View
ACSAC
2002
IEEE
15 years 8 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
106
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ACMSE
2006
ACM
15 years 9 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
HICSS
2000
IEEE
160views Biometrics» more  HICSS 2000»
15 years 7 months ago
Analysis of Coordinated Multilateral Trades
A new operating paradigm is still needed for the power industry in order to achieve a workable deregulated market. The two main proposals, namely the Bilateral and the Poolco mode...
Pierre-François D. Quet, Jose B. Cruz Jr., ...
CBMS
2006
IEEE
15 years 9 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...