Sciweavers

1757 search results - page 90 / 352
» Secure Content Validation
Sort
View
CEAS
2004
Springer
15 years 8 months ago
Word Stemming to Enhance Spam Filtering
Generally a content based spam filter works on words and phrases of email text and if it finds offensive content it gives that email a numerical value (depending on the content). A...
Shabbir Ahmed, Farzana Mithun
128
Voted
EPEW
2005
Springer
15 years 8 months ago
Choreographing Security and Performance Analysis for Web Services
We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from ...
Stephen Gilmore, Valentin Haenel, Leïla Kloul...
FM
2005
Springer
125views Formal Methods» more  FM 2005»
15 years 8 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
15 years 8 months ago
Secure data hiding in binary document images for authentication
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...
Haiping Lu, Alex C. Kot, Jun Cheng
COMCOM
2000
79views more  COMCOM 2000»
15 years 3 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee