Sciweavers

12637 search results - page 113 / 2528
» Security for Extensible Systems
Sort
View
125
Voted
FI
2011
96views more  FI 2011»
14 years 10 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
115
Voted
VLDB
1991
ACM
113views Database» more  VLDB 1991»
15 years 7 months ago
Implementing Set-Oriented Production Rules as an Extension to Starburst
This paper describes the implementation of a set-oriented database production rule language proposed in earlier papers. Our implementation uses the extensibility features of the St...
Jennifer Widom, Roberta Cochrane, Bruce G. Lindsay
101
Voted
SEC
2004
15 years 5 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
134
Voted
UML
1999
Springer
15 years 8 months ago
Towards a UML Extension for Hypermedia Design
Abstract. The acceptance of UML as a de facto standard for the design of object-oriented systems, together with the explosive growth of the World Wide Web has raised the need for U...
Hubert Baumeister, Nora Koch, Luis Mandel
117
Voted
LISA
2004
15 years 5 months ago
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
Spyware is a rapidly spreading problem for PC users causing significant impact on system stability and privacy concerns. It attaches to extensibility points in the system to ensur...
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron...