Sciweavers

6844 search results - page 1066 / 1369
» Web Service Security
Sort
View
SIGIR
2012
ACM
13 years 7 months ago
Task complexity, vertical display and user interaction in aggregated search
Aggregated search is the task of blending results from specialized search services or verticals into the Web search results. While many studies have focused on aggregated search t...
Jaime Arguello, Wan-Ching Wu, Diane Kelly, Ashlee ...
ACSAC
2010
IEEE
15 years 3 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
SIGCOMM
2009
ACM
15 years 11 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
HPCC
2007
Springer
15 years 11 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
FC
1998
Springer
96views Cryptology» more  FC 1998»
15 years 9 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
« Prev « First page 1066 / 1369 Last » Next »