Sciweavers

56 search results - page 11 / 12
» Communicating Distributed H systems with Simple Splicing Rul...
Sort
View
CCR
2005
129views more  CCR 2005»
13 years 7 months ago
The problem of synthetically generating IP traffic matrices: initial recommendations
There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
Antonio Nucci, Ashwin Sridharan, Nina Taft
CCS
2007
ACM
14 years 1 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
DRM
2006
Springer
13 years 11 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
CCS
2007
ACM
14 years 1 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
EUROSYS
2009
ACM
14 years 4 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble