Sciweavers

ACJ
2006
58views more  ACJ 2006»
14 years 11 months ago
Cooperative Defence Against DDoS Attacks
Guangsen Zhang, Manish Parashar
ACJ
2006
57views more  ACJ 2006»
14 years 11 months ago
An Attribute-Based Delegation Model and Its Extension
Chunxiao Ye, Zhongfu Wu, Yunqing Fu
ACJ
2006
117views more  ACJ 2006»
14 years 11 months ago
A UML 2.0/OCL Extension for Designing Secure Data Warehouses
Rodolfo Villarroel, Eduardo Fernández-Medin...
53
Voted
ACJ
2006
105views more  ACJ 2006»
14 years 11 months ago
Return On Security Investment (ROSI) - A Practical Quantitative Modell
Wes Sonnenreich, Jason Albanese, Bruce Stout
ACJ
2006
86views more  ACJ 2006»
14 years 11 months ago
Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Siraj A. Shaikh, Vicky J. Bush
ACJ
2006
59views more  ACJ 2006»
14 years 11 months ago
Towards a Process for Web Services Security
Carlos Gutiérrez, Eduardo Fernández-...
ACJ
2006
85views more  ACJ 2006»
14 years 11 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
ACJ
2006
67views more  ACJ 2006»
14 years 11 months ago
Controlled Sharing of Personal Content Using Digital Rights Management
Claudine Conrado, Milan Petkovic, Michiel van der ...
ACJ
2006
47views more  ACJ 2006»
14 years 11 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...