Sciweavers

5273 search results - page 202 / 1055
» Secured Web Access
Sort
View
137
Voted
CL
2002
Springer
15 years 4 months ago
Security boundaries in mobile ambients
A new notion of security boundary is introduced to model multilevel security policies in the scenario of mobile systems, within Cardelli and Gordon's "pure" mobile ...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
ENTCS
2008
83views more  ENTCS 2008»
15 years 4 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
144
Voted
DMDW
2000
118views Management» more  DMDW 2000»
15 years 6 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
IJWMC
2006
112views more  IJWMC 2006»
15 years 4 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
IJCAI
2003
15 years 6 months ago
Source Update Capture in Information Agents
In this paper we present strategies for successfully capturing updates at Web sources. Web-based information agents provide integrated access to autonomous Web sources that can ge...
Naveen Ashish, Deepak Kulkarni, Yao Wang