Sciweavers

1757 search results - page 119 / 352
» Secure Content Validation
Sort
View
AISM
2004
15 years 4 months ago
Securing Web Services with XML aware Digital Signatures
The evolution of web services has facilitated the integration of business processes scattered across different geographical locations of the world. Along with the benefits that we...
Sabbir Ahmed, Leisa Armstrong
ESWA
2008
155views more  ESWA 2008»
15 years 3 months ago
Using GHSOM to construct legal maps for Taiwan's securities and futures markets
A good legal knowledge representation system, capable of effectively providing investors with comprehensive legal knowledge, is needed for investors to prevent erratic behavior be...
Jen-Ying Shih, Yu-Jung Chang, Wun-Hwa Chen
107
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 3 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
IEEEHPCS
2010
15 years 1 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 7 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki