Sciweavers

1183 search results - page 62 / 237
» On flow-sensitive security types
Sort
View
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
16 years 4 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
ACISP
2008
Springer
15 years 11 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
ISCIS
2005
Springer
15 years 10 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
ISJGP
2007
89views more  ISJGP 2007»
15 years 4 months ago
Trends in Security Product Evaluations
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Richard E. Smith
OOPSLA
2004
Springer
15 years 10 months ago
RAIL: code instrumentation for .NET
Code instrumentation is a mechanism that allows modules of programs to be completely rewritten at runtime. With the advent of virtual machines, this type of functionality is becom...
Bruno Cabral, Paulo Marques, Luís Moura Sil...