Sciweavers

865 search results - page 91 / 173
» A Secure Information Flow Architecture for Web Services
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 1 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
168
Voted
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
16 years 14 hour ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
ICWS
2004
IEEE
15 years 1 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin
CAISE
2010
Springer
14 years 10 months ago
Search Computing Systems
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Stefano Ceri, Marco Brambilla
WWW
2004
ACM
16 years 16 days ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger