Sciweavers

1403 search results - page 87 / 281
» Security Model for XML Data
Sort
View
ERSA
2009
109views Hardware» more  ERSA 2009»
15 years 2 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
NSDI
2008
15 years 6 months ago
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model
In this paper, we discuss Bitfrost, the security model developed by the One Laptop Per Child project for its XO laptop computers. Bitfrost implements a number of security measures...
Meredith L. Patterson, Len Sassaman, David Chaum
EDBTW
2006
Springer
15 years 6 months ago
Efficient Integrity Checking over XML Documents
The need for incremental constraint maintenance within collections of semi-structured documents has been ever increasing in the last years due to the widespread diffusion of XML. T...
Daniele Braga, Alessandro Campi, Davide Martinengh...
ACSAC
2003
IEEE
15 years 9 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
ICDE
2011
IEEE
232views Database» more  ICDE 2011»
14 years 8 months ago
XClean: Providing valid spelling suggestions for XML keyword queries
—An important facility to aid keyword search on XML data is suggesting alternative queries when user queries contain typographical errors. Query suggestion thus can improve users...
Yifei Lu, Wei Wang, Jianxin Li, Chengfei Liu