Sciweavers

187 search results - page 7 / 38
» Challenges in Securing the Domain Name System
Sort
View
SACMAT
2009
ACM
15 years 10 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
USS
2010
15 years 1 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
ATC
2006
Springer
15 years 7 months ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
128
Voted
AAAI
2004
15 years 5 months ago
Methods for Domain-Independent Information Extraction from the Web: An Experimental Comparison
Our KNOWITALL system aims to automate the tedious process of extracting large collections of facts (e.g., names of scientists or politicians) from the Web in an autonomous, domain...
Oren Etzioni, Michael J. Cafarella, Doug Downey, A...
107
Voted
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
15 years 8 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer