Sciweavers

594 search results - page 79 / 119
» Atomicity in Electronic Commerce
Sort
View
ICDE
2000
IEEE
115views Database» more  ICDE 2000»
14 years 10 months ago
Optimization Techniques for Data-Intensive Decision Flows
For an enterprise to take advantage of the opportunities afforded by electronic commerce it must be able to make decisions about business transactions in near-realtime. In the com...
Bharat Kumar, François Llirbat, Gang Zhou, ...
WWW
2008
ACM
14 years 9 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
WWW
2007
ACM
14 years 9 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
WWW
2007
ACM
14 years 9 months ago
Reliable QoS monitoring based on client feedback
Service-level agreements (SLAs) establish a contract between service providers and clients concerning Quality of Service (QoS) parameters. Without proper penalties, service provid...
Radu Jurca, Boi Faltings, Walter Binder
WWW
2006
ACM
14 years 9 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz