Sciweavers

5273 search results - page 170 / 1055
» Secured Web Access
Sort
View
SOCA
2007
IEEE
15 years 10 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
ACMSE
2006
ACM
15 years 10 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
ICOIN
2001
Springer
15 years 9 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
FOSSACS
2006
Springer
15 years 8 months ago
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Abstract. Web services are an important series of industry standards for adding semantics to web-based and XML-based communication, in particular among enterprises. Like the entire...
Michael Backes, Sebastian Mödersheim, Birgit ...
ERCIMDL
2003
Springer
74views Education» more  ERCIMDL 2003»
15 years 9 months ago
Preserving the Fabric of Our Lives: A Survey of Web
This paper argues that the growing importance of the World Wide Web means that Web sites are key candidates for digital preservation. After an brief outline of some of the main rea...
Michael Day