Sciweavers

27 search results - page 1 / 6
» JSLINQ: Building Secure Applications across Tiers
Sort
View
CCS
2007
ACM
13 years 8 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
OOPSLA
2007
Springer
13 years 10 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
SIGMOD
2002
ACM
113views Database» more  SIGMOD 2002»
13 years 4 months ago
The n-Tier Hub Technology
During 2001, the Enterprise Engineering Laboratory at George Mason University was contracted by the Boeing Company to develop an eHub capability for aerospace suppliers in Taiwan....
Rainer A. Sommer, Thomas R. Gulledge, David Bailey
CCS
2011
ACM
12 years 4 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
TASLP
2008
150views more  TASLP 2008»
13 years 4 months ago
Automatic Prosodic Event Detection Using Acoustic, Lexical, and Syntactic Evidence
With the advent of prosody annotation standards such as tones and break indices (ToBI), speech technologists and linguists alike have been interested in automatically detecting pro...
Sankaranarayanan Ananthakrishnan, Shrikanth S. Nar...