Sciweavers

359 search results - page 34 / 72
» Supporting Real World Security Models in Java
Sort
View
INFOCOM
2005
IEEE
15 years 8 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
138
Voted
WINET
2010
179views more  WINET 2010»
15 years 29 days ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
WWW
2009
ACM
16 years 3 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
109
Voted
ER
2007
Springer
103views Database» more  ER 2007»
15 years 8 months ago
Ontological Semantics for the Use of UML in Conceptual Modeling
Despite its origins in software modeling, there has been growing interest in using the Unified Modeling Language (UML) for conceptual modeling of application domains. However, the...
Xueming Li, Jeffrey Parsons
110
Voted
ACSAC
2001
IEEE
15 years 6 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang