Sciweavers

2393 search results - page 470 / 479
» Cloud Service Engineering
Sort
View
FC
2006
Springer
129views Cryptology» more  FC 2006»
13 years 11 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
WWW
2010
ACM
13 years 11 months ago
Enabling entity-based aggregators for web 2.0 data
Selecting and presenting content culled from multiple heterogeneous and physically distributed sources is a challenging task. The exponential growth of the web data in modern time...
Ekaterini Ioannou, Claudia Niederée, Yannis...
HICSS
1995
IEEE
90views Biometrics» more  HICSS 1995»
13 years 11 months ago
Connection management without retaining information
Managing a connection between two hosts in a network is an important service to provide in order to make the network useful for many applications. The two main subproblems are the...
Hagit Attiya, Shlomi Dolev, Jennifer L. Welch
USENIX
2007
13 years 9 months ago
A Memory Soft Error Measurement on Production Systems
Memory state can be corrupted by the impact of particles causing single-event upsets (SEUs). Understanding and dealing with these soft (or transient) errors is important for syste...
Xin Li, Kai Shen, Michael C. Huang, Lingkun Chu
CCS
2008
ACM
13 years 9 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...