Sciweavers

350 search results - page 25 / 70
» Improving application security with data flow assertions
Sort
View
FAST
2003
14 years 11 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 3 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
CCS
2008
ACM
14 years 11 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
105
Voted
LCPC
1998
Springer
15 years 1 months ago
Automatic Parallelization of C by Means of Language Transcription
The automatic parallelization of C has always been frustrated by pointer arithmetic, irregular control flow and complicated data aggregation. Each of these problems is similar to f...
Richard L. Kennell, Rudolf Eigenmann
ICIP
1994
IEEE
15 years 11 months ago
Robust Optical Flow Estimation
Motion information is essential in many computer vision and video analysis tasks. Since MPEG is still one of the most prevalent formats for representing, transferring and storing ...
Sugata Ghosal, Rajiv Mehrotra