Sciweavers

1527 search results - page 253 / 306
» A Survey of Web Security
Sort
View
PET
2004
Springer
15 years 4 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
OOPSLA
1998
Springer
15 years 3 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
15 years 3 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
ACSAC
2004
IEEE
15 years 3 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
COMPSAC
2004
IEEE
15 years 3 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...