Sciweavers

1403 search results - page 115 / 281
» Security Model for XML Data
Sort
View
148
Voted
PLDI
2009
ACM
15 years 11 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
IEEESP
2010
99views more  IEEESP 2010»
15 years 3 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
CAISE
2000
Springer
15 years 9 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
IJNSEC
2007
96views more  IJNSEC 2007»
15 years 4 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
DILS
2004
Springer
15 years 8 months ago
An Ontology-Driven Framework for Data Transformation in Scientific Workflows
Abstract. Ecologists spend considerable effort integrating heterogeneous data for statistical analyses and simulations, for example, to run and test predictive models. Our research...
Shawn Bowers, Bertram Ludäscher