Language-based security

Results: 118



#Item
51Security / Federated identity / Identity assurance / OpenID / Authentication / Security Assertion Markup Language / National Strategy for Trusted Identities in Cyberspace / Daon /  Inc. / Anakam / Identity management / Identity / Computer security

Cloud-Based Identity Services TrustX Technologies, Inc[removed]  Random  Hills  Rd.,  Suite  650   Fairfax,  VA    22030

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:58
52Crime prevention / National security / Information flow / Information theory / Computer network security / Information security / Covert channel / Bell–LaPadula model / Mandatory access control / Security / Computer security / Public safety

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-01-07 13:58:19
53Science / Real-time web / Internet search engines / Social media / Text messaging / Twitter / Internet privacy / Latent Dirichlet allocation / Microblogging / World Wide Web / Statistical natural language processing / Information science

2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing Finding Credible Information Sources in Social Networks Based on Content and Social Structu

Add to Reading List

Source URL: www.parc.com

Language: English - Date: 2011-10-18 02:47:45
54Access control / Capability-based security / Microkernel / L4 microkernel family / Coyotos / EROS / Formal verification / Kernel / Isabelle / Computer architecture / Security / Computer security

capDL: A Language for Describing Capability-Based Systems Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker NICTA and University of New South Wales Sydney, Australia

Add to Reading List

Source URL: ssrg.nicta.com.au

Language: English - Date: 2013-10-20 22:10:09
55Computer security / System software / BMC Remedy Action Request System / Security Assertion Markup Language / OpenID / SAML-based products and services / Ubuntu Single Sign On / Identity / Identity management / Federated identity

SSO Plugin Overview of features J System Solutions http://www.javasystemsolutions.com Version 1.2

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2012-09-29 09:05:46
56System software / Federated identity / Data management / Directory services / Radiant Logic / Virtual directory / Metadirectory / SAML 2.0 / Security Assertion Markup Language / Identity management / Computer security / Computing

TM RADIANTONE: BUYER’S GUIDE Toward a Federated Identity Service Based on Virtualization

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-03-04 09:45:33
57Software / Security Assertion Markup Language / Cloud computing / Microsoft SharePoint / WS-Security / Application programming interface / API Management / SAML-based products and services / Computing / Identity management / System software

DATA SHEET CA API Gateway At a Glance APIs are becoming ubiquitous as enterprises increasingly need to open up to mobile devices, cloud-based services, partners and third-party developers. The CA API Gateway provides a

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2015-02-02 10:00:34
58National security / Computer network security / Secure communication / Security policy / Reference monitor / Trusted computing base / Kernel / Protection mechanism / Vulnerability / Computer security / Security / Crime prevention

A Language-Based Approach to Security Fred B. Schneider1 , Greg Morrisett1 , and Robert Harper2 2 1 Cornell University, Ithaca, NY

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-13 15:41:39
59Type theory / Cross-platform software / Crime prevention / National security / Computer security / Information flow / Cyclone / Type safety / Information security / Computing / Software engineering / Programming language theory

Language-Based Security for Malicious Mobile Code Fred B. Schneider [removed] Dexter Kozen [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-07-08 16:43:04
60Cyberwarfare / Computer network security / Identity management / Identity management systems / Security Assertion Markup Language / Penetration test / OWASP / Vulnerability / Security testing / Computer security / Software testing / Security

The SPaCIoS Tool property-driven and vulnerability-driven security testing for Web-based apps Luca Compagna, Product Security Research, SAP AG (on behalf of SPaCIoS consortium)

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-29 18:37:08
UPDATE