Sciweavers

641 search results - page 72 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
CCS
2000
ACM
15 years 2 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
ICFP
2012
ACM
13 years 5 days ago
Addressing covert termination and timing channels in concurrent information flow systems
When termination of a program is observable by an adversary, confidential information may be leaked by terminating accordingly. While this termination covert channel has limited ...
Deian Stefan, Alejandro Russo, Pablo Buiras, Amit ...
WWW
2008
ACM
15 years 10 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
ER
2005
Springer
177views Database» more  ER 2005»
15 years 3 months ago
Conceptual Content Management for Enterprise Web Services
Web services aim at providing an interoperable framework for cross system and multiple domain communication. Current basic standards are allowing for first cases of practical use ...
Sebastian Bossung, Hans-Werner Sehring, Joachim W....
NOSSDAV
2005
Springer
15 years 3 months ago
ACE: an active, client-directed method for reducing energy during web browsing
In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transit...
Haijin Yan, David K. Lowenthal, Kang Li