Sciweavers

95 search results - page 18 / 19
» Trustworthy Access Control with Untrustworthy Web Servers
Sort
View
IUI
2004
ACM
13 years 10 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
NSDI
2007
13 years 7 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
BMCBI
2004
130views more  BMCBI 2004»
13 years 5 months ago
PATTERNFINDER: combined analysis of DNA regulatory sequences and double-helix stability
Background: Regulatory regions that function in DNA replication and gene transcription contain specific sequences that bind proteins as well as less-specific sequences in which th...
Yanlin Huang, David Kowalski
EUROSYS
2007
ACM
14 years 2 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
EUROSYS
2008
ACM
14 years 2 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler