Sciweavers

ACJ
2006
58views more  ACJ 2006»
14 years 9 months ago
Cooperative Defence Against DDoS Attacks
Guangsen Zhang, Manish Parashar
45
Voted
ACJ
2006
57views more  ACJ 2006»
14 years 9 months ago
An Attribute-Based Delegation Model and Its Extension
Chunxiao Ye, Zhongfu Wu, Yunqing Fu
78
Voted
ACJ
2006
117views more  ACJ 2006»
14 years 9 months ago
A UML 2.0/OCL Extension for Designing Secure Data Warehouses
Rodolfo Villarroel, Eduardo Fernández-Medin...
ACJ
2006
105views more  ACJ 2006»
14 years 9 months ago
Return On Security Investment (ROSI) - A Practical Quantitative Modell
Wes Sonnenreich, Jason Albanese, Bruce Stout
45
Voted
ACJ
2006
86views more  ACJ 2006»
14 years 9 months ago
Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Siraj A. Shaikh, Vicky J. Bush
54
Voted
ACJ
2006
59views more  ACJ 2006»
14 years 9 months ago
Towards a Process for Web Services Security
Carlos Gutiérrez, Eduardo Fernández-...
70
Voted
ACJ
2006
85views more  ACJ 2006»
14 years 9 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
51
Voted
ACJ
2006
67views more  ACJ 2006»
14 years 9 months ago
Controlled Sharing of Personal Content Using Digital Rights Management
Claudine Conrado, Milan Petkovic, Michiel van der ...
44
Voted
ACJ
2006
47views more  ACJ 2006»
14 years 9 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...