Sciweavers

486 search results - page 62 / 98
» What was the Query
Sort
View
127
Voted
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
15 years 9 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens
DOCENG
2004
ACM
15 years 8 months ago
A document-based approach to the generation of web applications
: XML is unique in its very broad acceptance throughout both the document engineering and data processing community. This creates a unique opportunity for unifying the traditionall...
Andrea R. de Andrade, Ethan V. Munson, Maria da Gr...
120
Voted
FSE
2008
Springer
105views Cryptology» more  FSE 2008»
15 years 6 months ago
An Improved Security Bound for HCTR
HCTR was proposed by Wang, Feng and Wu in 2005. It is a mode of operation which provides a tweakable strong pseudorandom permutation. Though HCTR is quite an efficient mode, the au...
Debrup Chakraborty, Mridul Nandi
125
Voted
BXML
2004
15 years 6 months ago
Trust and context using the RDF-Source related Storage System (RDF-S3) and easy RQL (eRQL)
Abstract. There exist different ways how to understand and use context information for RDF data. This paper summarizes these different ways and concentrates on the source informati...
Karsten Tolle, Fabian Wleklinski
DMIN
2006
125views Data Mining» more  DMIN 2006»
15 years 6 months ago
Biomedical Hypothesis Generation and Testing by Evolutionary Computation
- Filtering the immense amount of data available electronically over the World Wide Web is an important task of search engines in data mining applications. Users when performing se...
Robert Kozma, Anna L. Buczak