Sciweavers

1943 search results - page 235 / 389
» Web application security engineering
Sort
View
CCS
1993
ACM
15 years 7 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
255
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
119
Voted
NSPW
2003
ACM
15 years 8 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
123
Voted
HT
2000
ACM
15 years 8 months ago
Ontology-supported and ontology-driven conceptual navigation on the World Wide Web
This paper presents the principles of ontology-supported and ontology-driven conceptual navigation. Conceptual navigation realizes the independence between resources and links to ...
Michel Crampes, Sylvie Ranwez
93
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...