Sciweavers

641 search results - page 82 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
CGO
2006
IEEE
15 years 3 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
IDMS
1998
Springer
76views Multimedia» more  IDMS 1998»
15 years 1 months ago
Exploiting User Behaviour in Prefetching WWW Documents
As the popularity of the World Wide Web increases, the amount of traffic results in major congestion problems for the retrieval of data over wide distances. To react to this, user...
Abdulmotaleb El-Saddik, Carsten Griwodz, Ralf Stei...
COMCOM
2000
85views more  COMCOM 2000»
14 years 9 months ago
Interactive Distributed Multimedia Systems and Telecommunication Services
As the popularity of the World Wide Web increases, the amount of traffic results in major congestion problems for the retrieval of data over wide distances. To react to this, user...
CCS
2008
ACM
14 years 11 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
POLICY
2007
Springer
15 years 3 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...