Sciweavers

568 search results - page 105 / 114
» Reusing relational sources for semantic information access
Sort
View
ESORICS
2000
Springer
15 years 3 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
LREC
2010
155views Education» more  LREC 2010»
15 years 1 months ago
Multimodal Russian Corpus (MURCO): First Steps
The paper introduces the Multimodal Russian Corpus (MURCO), which has been created in the framework of the Russian National Corpus (RNC). The MURCO provides the users with the gre...
Elena Grishina
BDA
2001
15 years 1 months ago
Querying RDF Descriptions for Community Web Portals
Community Web Portals (e.g., digital libraries, vertical aggregators, infomediaries) have become quite popular nowadays in supporting specific communities of interest on corporate...
Gregory Karvounarakis, Vassilis Christophides, Dim...
SIGCOMM
2010
ACM
14 years 12 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
SIGSOFT
2003
ACM
16 years 13 days ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz