Sciweavers

187 search results - page 31 / 38
» An integrated system for secure code distribution in Wireles...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
CSREASAM
2006
13 years 9 months ago
Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing Age
Considering disaster sensitivity especially in developing large-scale, multiple-use parking structures, we propose dual-surveillance based SCADA (supervisory control and data acqui...
Hsun-Jung Cho, Li-Yen Hsu
IJSEKE
1998
141views more  IJSEKE 1998»
13 years 7 months ago
REINAS: A Real-Time System for Managing Environmental Data
Managing scientific data is a challenging task, and many of the problems it presents have yet to be adequately solved. The Real-time Environmental Information Network and Analysi...
Eric C. Rosen, Theodore R. Haining, Darrell D. E. ...
PERCOM
2005
ACM
14 years 7 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan