Sciweavers

2290 search results - page 104 / 458
» Extensible Protected Types
Sort
View
100
Voted
WWW
2002
ACM
16 years 3 months ago
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service at...
Jaeyeon Jung, Balachander Krishnamurthy, Michael R...
HASE
2008
IEEE
15 years 9 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
CASSIS
2004
Springer
15 years 8 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 7 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
113
Voted
HPCA
2011
IEEE
14 years 6 months ago
Checked Load: Architectural support for JavaScript type-checking on mobile processors
Dynamic languages such as Javascript are the de-facto standard for web applications. However, generating efficient code for dynamically-typed languages is a challenge, because it...
Owen Anderson, Emily Fortuna, Luis Ceze, Susan Egg...