Sciweavers

1527 search results - page 239 / 306
» A Survey of Web Security
Sort
View
IPPS
2007
IEEE
15 years 5 months ago
A WSRF-Compliant Debugger for Grid Applications
Grid computing allows the utilization of vast computational resources for solving complex scientific and engineering problems. However, development tools for Grid applications are...
Donny Kurniawan, David Abramson
HPDC
2005
IEEE
15 years 5 months ago
The resource oriented authorization manager (ROAM)
The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible authorization system for the National Fusion Grid (FusionGrid). This system builds ...
Justin Burruss
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
15 years 4 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
APLAS
2008
ACM
15 years 1 months ago
An Operational Semantics for JavaScript
We define a small-step operational semantics for the ECMAScript standard language corresponding to JavaScript, as a basis for analyzing security properties of web applications and ...
Sergio Maffeis, John C. Mitchell, Ankur Taly
TISSEC
2008
100views more  TISSEC 2008»
14 years 11 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu