Sciweavers

2393 search results - page 366 / 479
» Cloud Service Engineering
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
CISIS
2010
IEEE
15 years 11 months ago
Computational Grid as an Appropriate Infrastructure for Ultra Large Scale Software Intensive Systems
—Ultra large scale (ULS) systems are future software intensive systems that have billions of lines of code, composed of heterogeneous, changing, inconsistent and independent elem...
Babak Rezaei Rad, Fereidoon Shams Aliee
SAC
2010
ACM
15 years 11 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
EDBTW
2010
Springer
15 years 11 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
FASE
2010
Springer
15 years 11 months ago
Performance Modeling and Analysis of Context-Aware Mobile Software Systems
Abstract. Context-awareness is becoming a first class attribute of software systems. In fact, applications for mobile devices need to be aware of their context in order to adapt t...
Luca Berardinelli, Vittorio Cortellessa, Antinisca...