Sciweavers

136 search results - page 11 / 28
» Baaz: A System for Detecting Access Control Misconfiguration...
Sort
View
USENIX
1994
15 years 28 days ago
Resolving File Conflicts in the Ficus File System
Ficus is a flexible replication facility with optimistic concurrency control designed to span a wide range of scales and network environments. Optimistic concurrency control provi...
Peter L. Reiher, John S. Heidemann, David Ratner, ...
NETWORK
2007
100views more  NETWORK 2007»
14 years 11 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
MACOM
2010
14 years 9 months ago
Quality of Service Oriented Analysis of Cross-Layer Design in Wireless Ad Hoc Networks
Abstract. In wireless ad hoc networks, cross-layer design aims at reducing multiple access interference and thus obtaining a higher spatial reuse. In order to identify the most sui...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
COMPSEC
2010
93views more  COMPSEC 2010»
14 years 11 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
ACMSE
2006
ACM
15 years 5 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta