Sciweavers

1757 search results - page 189 / 352
» Secure Content Validation
Sort
View
ISCC
2005
IEEE
15 years 5 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
SACMAT
2004
ACM
15 years 5 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
CIS
2004
Springer
15 years 5 months ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi
ISSRE
2003
IEEE
15 years 5 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
ACSAC
2002
IEEE
15 years 4 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok