Sciweavers

2335 search results - page 62 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
139
Voted
SWS
2004
ACM
15 years 10 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
NSDI
2010
15 years 6 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
ICDCSW
2002
IEEE
15 years 9 months ago
Stability of Autonomous Decentralized Flow Control Schemes in High-Speed Networks
This paper focuses on flow control in high-speed networks. Each node in the networks handles its local traffic flow only on the basis of the information it knows, but it is pre...
Masaki Aida, Chisa Takano
128
Voted
WWW
2010
ACM
15 years 10 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
TC
2001
15 years 6 months ago
The information integrity imperative
The paper first develops the core IS view of business activity, which comprises informational and physical work systems and central to which is the informational work system deliv...
Madhavan K. Nayar