Sciweavers

5722 search results - page 497 / 1145
» Security Function Interactions
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 8 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
15 years 8 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
CCS
2008
ACM
15 years 6 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
IJACT
2008
64views more  IJACT 2008»
15 years 4 months ago
An efficient one-move Nominative Signature scheme
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong
ENTCS
2002
90views more  ENTCS 2002»
15 years 4 months ago
Guardians for Ambient-based Monitoring
In the Mobile Ambients of Cardelli and Gordon an ambient is a unit for mobility, which may contain processes (data) and sub-ambients. Since the seminal work of Cardelli and Gordon...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...