Sciweavers

25 search results - page 4 / 5
» WSKE: Web Server Key Enabled Cookies
Sort
View
TSC
2010
133views more  TSC 2010»
13 years 4 months ago
Semantic-Based Mashup of Composite Applications
—The need for integration of all types of client and server applications that were not initially designed to interoperate is gaining popularity. One of the reasons for this popul...
Anne H. H. Ngu, Michael Pierre Carlson, Quan Z. Sh...
ICOIN
2001
Springer
13 years 10 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
ISW
2009
Springer
14 years 5 days ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
JVM
2004
106views Education» more  JVM 2004»
13 years 7 months ago
Kernel Plugins: When a VM Is Too Much
This paper presents kernel plugins, a framework for dynamic kernel specialization inspired by ideas borrowed from virtualization research. Plugins can be created and updated inexp...
Ivan B. Ganev, Greg Eisenhauer, Karsten Schwan
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 5 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...