Sciweavers

1748 search results - page 201 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
132
Voted
ACSAC
2010
IEEE
15 years 20 days ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
119
Voted
ODRL
2004
15 years 4 months ago
A Pervasive Application Rights Management Architecture (PARMA) based on ODRL
Software license management is currently expanding from its traditional desktop environment into the mobile application space, but software vendors are still applying old licensing...
Dominik Dahlem, Ivana Dusparic, Jim Dowling
136
Voted
BROADNETS
2006
IEEE
15 years 8 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
140
Voted
POPL
2010
ACM
16 years 8 hour ago
Static Determination of Quantitative Resource Usage for Higher-Order Programs
We describe a new automatic static analysis for determining upper-bound functions on the use of quantitative resources for strict, higher-order, polymorphic, recursive programs de...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
137
Voted
ICWS
2003
IEEE
15 years 4 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti