Sciweavers

59 search results - page 4 / 12
» Object Capabilities and Isolation of Untrusted Web Applicati...
Sort
View
CCS
2007
ACM
13 years 11 months ago
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...
Shuo Chen, David Ross, Yi-Min Wang
SOSP
2007
ACM
14 years 2 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
DBA
2006
173views Database» more  DBA 2006»
13 years 7 months ago
Object-Oriented Programming with Recursive Queries
: Recursive queries are required in many object-oriented database applications. Among them we can mention Bill-Of-Material (BOM), stock market dependencies, various kinds of networ...
Tomasz Pieciukiewicz, Krzysztof Stencel, Kazimierz...
LAWEB
2003
IEEE
13 years 11 months ago
Application Modeling for the Semantic Web
In this article we present a method for the design and implementation of Web Applications for the Semantic Web. Based on the "Object Oriented Hypermedia Design Method" a...
Fernanda Lima, Daniel Schwabe
CCS
2009
ACM
14 years 6 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...