Sciweavers

865 search results - page 132 / 173
» A Secure Information Flow Architecture for Web Services
Sort
View
SIGUCCS
2000
ACM
14 years 27 days ago
Knowledgebase Integration with a 24-hour Help Desk
The University of Pittsburgh's Computing Services and Systems Development organization is focused on the needs of the faculty and student population, totaling nearly 40,000 u...
Jay Graham, Brian K. Hart
DSN
2004
IEEE
14 years 8 days ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
CCS
2011
ACM
12 years 8 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
WWW
2001
ACM
14 years 9 months ago
Scaling question answering to the Web
The wealth of information on the web makes it an attractive resource for seeking quick answers to simple, factual questions such as "who was the first American in space?"...
Cody C. T. Kwok, Oren Etzioni, Daniel S. Weld
CCS
2009
ACM
14 years 3 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...