Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Internal clock synchronization has been investigated, or employed, for quite a number of years, under the requirement of good upper bounds for the deviation, or accuracy, between ...
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
We describe the problem of data dissemination in stream-oriented applications where the required filter is a function of the current state. We call such functions dynamic filter...
—The ability of a web service to provide low-latency access to its contents is constrained by available network bandwidth. It is important for the service to manage available ban...