Sciweavers

1748 search results - page 140 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
140
Voted
MEDIAFORENSICS
2010
15 years 4 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
COOPIS
2004
IEEE
15 years 7 months ago
TRAP/J: Transparent Generation of Adaptable Java Programs
This paper describes TRAP/J, a software tool that enables new adaptable behavior to be added to existing Java applications transparently (that is, without modifying the application...
Seyed Masoud Sadjadi, Philip K. McKinley, Betty H....
CCS
2011
ACM
14 years 3 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
ICCSA
2004
Springer
15 years 8 months ago
Semantic Completeness in Sub-ontology Extraction Using Distributed Methods
The use of ontologies lies at the very heart of the newly emerging era of Semantic Web. They provide a shared conceptualization of some domain that may be communicated between peop...
Mehul Bhatt, Carlo Wouters, Andrew Flahive, J. Wen...
ER
1998
Springer
123views Database» more  ER 1998»
15 years 7 months ago
From Object Oriented Conceptual Modeling to Automated Programming in Java
The development of Internet commercial applications and corporate Intranets around the world, which uses Java as the de facto standard language, is a significant topic in modern S...
Oscar Pastor, Vicente Pelechano, Emilio Insfr&aacu...