Sciweavers

1183 search results - page 70 / 237
» On flow-sensitive security types
Sort
View
DBPL
2009
Springer
131views Database» more  DBPL 2009»
15 years 11 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...
MDAI
2009
Springer
15 years 11 months ago
The Functionality-Security-Privacy Game
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achi...
Josep Domingo-Ferrer
131
Voted
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 10 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
ESCIENCE
2006
IEEE
15 years 8 months ago
A Collaborative Virtual Computer Security Lab
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
Jörg Keller, Ralf Naues
EURONGI
2008
Springer
15 years 6 months ago
Secure and Efficient Data Collection in Sensor Networks
Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed...
Cristina Cano, Manel Guerrero, Boris Bellalta