Sciweavers

6 search results - page 1 / 2
» Web-Application Security: From Reactive to Proactive
Sort
View
ITPRO
2010
56views more  ITPRO 2010»
13 years 9 months ago
Web-Application Security: From Reactive to Proactive
John R. Maguire, H. Gilbert Miller
FC
2010
Springer
132views Cryptology» more  FC 2010»
14 years 2 months ago
A Learning-Based Approach to Reactive Security
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the r...
Adam Barth, Benjamin I. P. Rubinstein, Mukund Sund...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 5 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
SPW
1999
Springer
14 years 3 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
IJWIN
2006
119views more  IJWIN 2006»
13 years 10 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...