Sciweavers

2517 search results - page 203 / 504
» Secure Deployment of Components
Sort
View
CCS
2007
ACM
15 years 10 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
CCS
2009
ACM
15 years 11 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ICDE
2001
IEEE
192views Database» more  ICDE 2001»
16 years 5 months ago
Integrating Data Mining with SQL Databases: OLE DB for Data Mining
The integration of data mining with traditional database systems is key to making it convenient, easy to deploy in real applications, and to growing its user base. In this paper w...
Amir Netz, Surajit Chaudhuri, Usama M. Fayyad, Jef...
ACMSE
2009
ACM
15 years 10 months ago
AVARI: animated virtual agent retrieving information
Avari is a virtual receptionist for the Computer Science department at The University of North Carolina at Charlotte. Her components include background subtraction to detect a per...
Lauren Cairco, Dale-Marie Wilson, Vicky Fowler, Mo...
MODELS
2007
Springer
15 years 10 months ago
A UML2 Profile for Service Modeling
In this article we provide an embedding of an interaction-based service notion into UML2. Such an embedding is needed, because to this date, UML2 has only limited support for servi...
Vina Ermagan, Ingolf H. Krüger