Sciweavers

393 search results - page 68 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
DL
1998
Springer
15 years 4 months ago
An Extensible Constructor Tool for the Rapid, Interactive Design of Query Synthesizers
We describe an extensible constructor tool that helps information experts (e.g., librarians) create specialized query synthesizers for heterogeneous digital-library environments. ...
Michelle Q. Wang Baldonado, Seth Katz, Andreas Pae...
CCS
2007
ACM
15 years 6 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
JSW
2007
102views more  JSW 2007»
14 years 11 months ago
A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems
— We propose a novel framework for building a distributed data acquisition and monitoring system. Our novel framework is mainly based on XML leverages and OPC (Openness, Producti...
Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi
SOUPS
2006
ACM
15 years 5 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
DRM
2006
Springer
15 years 3 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...