Sciweavers

1757 search results - page 46 / 352
» Secure Content Validation
Sort
View
SIGMOBILE
2002
80views more  SIGMOBILE 2002»
14 years 10 months ago
The design and applications of a context service
ese two applications are built upon the abstraction provided by the Context Service and thus help validate the design of this service. The first application, a Notification Dispatc...
Hui Lei, Daby M. Sow, John S. Davis II, Guruduth B...
77
Voted
CSE
2009
IEEE
15 years 3 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
SEMWEB
2009
Springer
15 years 5 months ago
Policy-Aware Content Reuse on the Web
The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research d...
Oshani Seneviratne, Lalana Kagal, Tim Berners-Lee
DSN
2007
IEEE
15 years 3 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ACSAC
2005
IEEE
15 years 4 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko