Sciweavers

1440 search results - page 12 / 288
» Third-Party Flow Control
Sort
View
INTERNET
2008
175views more  INTERNET 2008»
15 years 12 days ago
Mashing Up Search Services
through suitable abstractions and tools is a viable option for improving servicebased computations. T he past few years have witnessed end users' increasing involve ment in th...
Daniele Braga, Stefano Ceri, Florian Daniel, David...
98
Voted
SOUPS
2009
ACM
15 years 7 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
ESOP
1999
Springer
15 years 4 months ago
Interprocedural Control Flow Analysis
Control Flow Analysis is a widely used approach for analysing functional and object oriented programs. Once the applications become more demanding also the analysis needs to be mor...
Flemming Nielson, Hanne Riis Nielson
SWS
2004
ACM
15 years 5 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
101
Voted
DRM
2006
Springer
15 years 4 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver