Sciweavers

11 search results - page 2 / 3
» Transparent proxies for java futures
Sort
View
ACSAC
2004
IEEE
13 years 10 months ago
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain fun...
Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuj...
VIROLOGY
2008
95views more  VIROLOGY 2008»
13 years 6 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
ACSAC
2010
IEEE
13 years 4 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
WWW
2005
ACM
14 years 7 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini
MOBIHOC
2000
ACM
13 years 10 months ago
Low power rendezvous in embedded wireless networks
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...
Terry Todd, Frazer Bennett, Alan Jones