Sciweavers

332 search results - page 33 / 67
» Towards an Automatic Analysis of Web Service Security
Sort
View
EUROSSC
2006
Springer
15 years 3 months ago
Toward Wide Area Interaction with Ubiquitous Computing Environments
Despite many years of ubiquitous computing (ubicomp) middleware research, deployment of such systems has not been widespread. We suggest this is in part because we lack a shared mo...
Michael Blackstock, Rodger Lea, Charles Krasic
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 3 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 12 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
83
Voted
SEC
2007
15 years 1 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
IEEECIT
2010
IEEE
14 years 9 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark