Sciweavers

325 search results - page 16 / 65
» Secure safe ambients
Sort
View
FC
2010
Springer
183views Cryptology» more  FC 2010»
15 years 3 months ago
Automatically Preparing Safe SQL Queries
We present the first sound program source transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsa...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
ACSAC
2005
IEEE
15 years 5 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
CSFW
2006
IEEE
15 years 3 months ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
INTENV
2010
14 years 6 months ago
Proactive Intention Recognition for Home Ambient Intelligence
We explore a coherent combination of two jointly implemented logic programming based systems, namely those of Evolution Prospection and Intention Recognition, to address a number o...
Han The Anh, Luís Moniz Pereira
OTM
2009
Springer
15 years 6 months ago
Contemporary Challenges in Ambient Data Integration for Biodiversity Informatics
Biodiversity informatics (BDI) information is both highly localized and highly distributed. The temporal and spatial contexts of data collection events are generally of primary imp...
David Thau, Robert A. Morris, Sean White