Sciweavers

434 search results - page 19 / 87
» Security Documentation
Sort
View
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
15 years 6 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
106
Voted
SACMAT
2005
ACM
15 years 6 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
TAPSOFT
1997
Springer
15 years 4 months ago
A Type-Based Approach to Program Security
This paper presents a type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property. With all program input...
Dennis M. Volpano, Geoffrey Smith
98
Voted
VLDB
2004
ACM
147views Database» more  VLDB 2004»
15 years 5 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...
97
Voted
OOPSLA
2009
Springer
15 years 5 months ago
Software evolution and the moving picture metaphor
Software systems evolve over time. Currently we do not do a good job of documenting this evolution. This essay discusses the need to better document software evolution and introdu...
Mark Mahoney