Sciweavers

511 search results - page 31 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
148
Voted
WWW
2011
ACM
14 years 10 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
174
Voted
WS
2005
ACM
15 years 9 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
133
Voted
WWW
2004
ACM
16 years 4 months ago
The webgraph framework I: compression techniques
Studying Web graphs is often difficult due to their large size. Recently, several proposals have been published about various techniques that allow to store a Web graph in memory ...
Paolo Boldi, Sebastiano Vigna
ACSAC
2007
IEEE
15 years 10 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
151
Voted
CCS
2005
ACM
15 years 9 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi