Sciweavers

44 search results - page 8 / 9
» Java Security Extensions for a Java Server in a Hostile Envi...
Sort
View
ACSC
2004
IEEE
13 years 10 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
OOPSLA
1999
Springer
13 years 10 months ago
Object Views: Language Support for Intelligent Object Caching in Parallel and Distributed Computations
Object-based parallel and distributed applications are becoming increasingly popular, driven by the programmability advantages of component technology and a flat shared-object spa...
Ilya Lipkind, Igor Pechtchanski, Vijay Karamcheti
ICSE
2008
IEEE-ACM
14 years 7 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
IMC
2010
ACM
13 years 4 months ago
Netalyzr: illuminating the edge network
In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to...
Christian Kreibich, Nicholas Weaver, Boris Nechaev...
KIVS
1999
Springer
13 years 10 months ago
Mobile Agents as an Architectural Concept for Internet-Based Distributed Applications - The WASP Project Approach
Abstract. After introducing the concept of mobile agents and potential application domains, we motivate why mobile agent technology is an interesting concept for large Internet-bas...
Stefan Fünfrocken, Friedemann Mattern