Sciweavers

92 search results - page 13 / 19
» Constructing Database Systems in a Persistent Environment
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 2 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
DASFAA
2005
IEEE
256views Database» more  DASFAA 2005»
14 years 2 months ago
CoCache: Query Processing Based on Collaborative Caching in P2P Systems
Peer-to-peer (P2P) computing is gaining more and more significance due to its widespread use currently and potential deployments in future applications. In this paper, we propose ...
Weining Qian, Linhao Xu, Shuigeng Zhou, Aoying Zho...
POPL
2006
ACM
14 years 9 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
ATC
2006
Springer
14 years 10 days ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
ICDE
2004
IEEE
108views Database» more  ICDE 2004»
14 years 10 months ago
Using Stream Semantics for Continuous Queries in Media Stream Processors
In this demonstration paper we present a stream query processor capable of handling media (audio, video, motion ...) and feature streams. We show that due to their inherent semant...
Amarnath Gupta, Bin Liu, Pilho Kim, Ramesh Jain