Sciweavers

390 search results - page 60 / 78
» Usable Access Control for the World Wide Web
Sort
View
UIST
2005
ACM
15 years 7 months ago
Automation and customization of rendered web pages
On the desktop, an application can expect to control its user interface down to the last pixel, but on the World Wide Web, a content provider has no control over how the client wi...
Michael Bolin, Matthew Webber, Philip Rha, Tom Wil...
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 8 months ago
Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network
— In recent years, many high-speed congestion control (HSCC) algorithms have been proposed for utilizing network pipes with huge bandwidth-delay product (BDP), and some of them h...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
CCS
2008
ACM
15 years 3 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 1 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
PET
2010
Springer
15 years 5 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...