Sciweavers

2904 search results - page 335 / 581
» Internet Infrastructure Security
Sort
View
162
Voted
CCS
2011
ACM
14 years 4 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
OOPSLA
2009
Springer
15 years 9 months ago
Fault-based combinatorial testing of web services
Abstract—The Internet houses diverse applications (i.e., banking, networking, etc.), commonly implemented as web services. Web services are flexible but can become complex, maki...
Bellanov S. Apilli
160
Voted
SACMAT
2010
ACM
15 years 3 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
155
Voted
PERCOM
2005
ACM
16 years 4 months ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...
129
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
P2P Second Life: Experimental Validation Using Kad
: Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communic...
Matteo Varvello, C. Diout, Ernst W. Biersack