Sciweavers

1757 search results - page 159 / 352
» Secure Content Validation
Sort
View
SAC
2002
ACM
14 years 11 months ago
Temporal query operators in XML databases
We have in a previous paper introduced the new query operators that are needed in order to support an XML query language that supports temporal operations. The query operators mak...
Kjetil Nørvåg
FSTTCS
2003
Springer
15 years 5 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
COLCOM
2009
IEEE
15 years 3 months ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
WWW
2006
ACM
16 years 15 days ago
SecuBat: a web vulnerability scanner
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a...
Christopher Krügel, Engin Kirda, Nenad Jovano...
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
14 years 6 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun