Sciweavers

1222 search results - page 51 / 245
» Verifying a File System Implementation
Sort
View
DEBU
2002
112views more  DEBU 2002»
15 years 2 months ago
Architecture and Implementation of an XQuery-based Information Integration Platform
An increasing number of business users and software applications need to process information that is accessible via multiple diverse information systems, such as database systems,...
Yannis Papakonstantinou, Vasilis Vassalos
ICAIL
2007
ACM
15 years 6 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
WOTE
2010
15 years 6 days ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 6 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
WWW
2010
ACM
15 years 2 months ago
Structured audio podcasts via web text-to-speech system
Audio podcasting is increasingly present in the educational field and is especially appreciated as an ubiquitous/pervasive tool ("anywhere, anytime, at any pace") for ac...
Giulio Mori, Maria Claudia Buzzi, Marina Buzzi, Ba...