Sciweavers

1748 search results - page 162 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
CCR
2004
74views more  CCR 2004»
15 years 2 months ago
Unveiling the transport
Traditional application programming interfaces for transport protocols make a virtue of hiding most internal per-connection state. We argue that this informationhiding precludes m...
Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Low...
DSN
2005
IEEE
15 years 8 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
ATAL
2010
Springer
15 years 4 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
DRM
2003
Springer
15 years 8 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
CICLING
2010
Springer
15 years 9 months ago
Multi-view Bootstrapping for Relation Extraction by Exploring Web Features and Linguistic Features
Binary semantic relation extraction from Wikipedia is particularly useful for various NLP and Web applications. Currently frequent pattern miningbased methods and syntactic analysi...
Yulan Yan, Haibo Li, Yutaka Matsuo, Mitsuru Ishizu...