Sciweavers

95 search results - page 7 / 19
» Trustworthy Access Control with Untrustworthy Web Servers
Sort
View
EUROSYS
2007
ACM
15 years 6 months ago
Comparing the performance of web server architectures
In this paper, we extensively tune and then compare the performance of web servers based on three different server architectures. The µserver utilizes an event-driven architectur...
David Pariag, Tim Brecht, Ashif S. Harji, Peter A....
BMCBI
2007
104views more  BMCBI 2007»
14 years 9 months ago
TISs-ST: a web server to evaluate polymorphic translation initiation sites and their reflections on the secretory targets
Background: The nucleotide sequence flanking the translation initiation codon (start codon context) affects the translational efficiency of eukaryotic mRNAs, and may indicate the ...
Renato Vicentini, Marcelo Menossi
CCS
2000
ACM
15 years 2 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
ESWS
2004
Springer
15 years 1 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
15 years 4 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...