Sciweavers

1183 search results - page 113 / 237
» On flow-sensitive security types
Sort
View
INFOSCALE
2007
ACM
15 years 6 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
ISI
2006
Springer
15 years 4 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
JNW
2007
135views more  JNW 2007»
15 years 4 months ago
Access Control in Decentralised Publish/Subscribe Systems
Abstract— Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
CORR
2011
Springer
196views Education» more  CORR 2011»
14 years 8 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
212
Voted
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
14 years 4 days ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross