Sciweavers

2429 search results - page 346 / 486
» Using Aspects to Design a Secure System
Sort
View
CN
2007
106views more  CN 2007»
14 years 10 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
ESORICS
2012
Springer
13 years 13 days ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
ECIR
1998
Springer
14 years 11 months ago
Evaluation of Interfaces for IRS: Modelling End-User Searching Behaviour
This paper describes an investigation in progress into the searching behaviour of end-users and how it is affected by interface design. The project focused on qualitative data gat...
Victoria Manglano, Micheline Beaulieu, Stephen E. ...
CHI
2006
ACM
15 years 10 months ago
Fast, flexible filtering with phlat
Systems for fast search of personal information are rapidly becoming ubiquitous. Such systems promise to dramatically improve personal information management, yet most are modeled...
Edward Cutrell, Daniel C. Robbins, Susan T. Dumais...
IEEESCC
2007
IEEE
15 years 4 months ago
A Service Discovery Framework based on Linear Composition
Service discovery has been recognised as an important aspect of service oriented computing. This is even more the case when developing service centric systems in which software sy...
Andrea Zisman, Khaled Mahbub, George Spanoudakis