Sciweavers

1527 search results - page 235 / 306
» A Survey of Web Security
Sort
View
ACSAC
2004
IEEE
15 years 4 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
82
Voted
OOPSLA
1995
Springer
15 years 4 months ago
Annotating Objects for Transport to Other Worlds
In Self 4.0, people write programs by directly constructing webs of objects in a larger world of objects. But in order to save or share these programs, the objects must be moved t...
David Ungar
90
Voted
ICWS
2004
IEEE
15 years 2 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin
100
Voted
WEBNET
2001
15 years 2 months ago
Managing Distributed Personal Firewalls with Smart Data Servers
: Modern security architectures tend to become more and more complex. Not only the chances to improve Web applications using several data channels and diverse (TCP-)ports are very ...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...
89
Voted
ITIIS
2008
91views more  ITIIS 2008»
15 years 25 days ago
Towards a Server-Centric Interaction Architecture for Wireless Applications
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...