Sciweavers

1286 search results - page 91 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
COLCOM
2007
IEEE
15 years 7 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...
PPAM
2007
Springer
15 years 7 months ago
Cloth Simulation in the SILC Matrix Computation Framework: A Case Study
This paper presents a case study of numerical simulations in an easy-to-use matrix computation framework named Simple Interface for Library Collections (SILC), which allows users t...
Tamito Kajiyama, Akira Nukada, Reiji Suda, Hidehik...
ICDCSW
2005
IEEE
15 years 6 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
HPCA
2006
IEEE
16 years 1 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ACSAC
2010
IEEE
14 years 11 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald