Sciweavers

1943 search results - page 246 / 389
» Web application security engineering
Sort
View
SADFE
2008
IEEE
15 years 10 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
139
Voted
SASO
2008
IEEE
15 years 10 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
VLDB
2004
ACM
152views Database» more  VLDB 2004»
16 years 3 months ago
The BEA streaming XQuery processor
Abstract This paper describes the design, implementation, and performance characteristics of a commercial XQuery processing engine, the BEA streaming XQuery processor. This XQuery ...
Daniela Florescu, Chris Hillery, Donald Kossmann, ...
MM
2006
ACM
164views Multimedia» more  MM 2006»
15 years 9 months ago
Scalable relevance feedback using click-through data for web image retrieval
Relevance feedback (RF) has been extensively studied in the content-based image retrieval community. However, no commercial Web image search engines support RF because of scalabil...
En Cheng, Feng Jing, Lei Zhang, Hai Jin
152
Voted
WWW
2003
ACM
15 years 8 months ago
User Access Pattern Enhanced Small Web Search
Current search engines generally employ link analysis techniques to web-page re-ranking. However, the same techniques are problematic in small webs, such as websites or intranet w...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...