Sciweavers

906 search results - page 110 / 182
» Controlling Control Flow in Web Applications
Sort
View
107
Voted
PERCOM
2011
ACM
14 years 6 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
ICIW
2009
IEEE
15 years 9 months ago
An Adaptive Scheduling Policy for Staged Applications
The performance of Web servers and application servers is a crucial factor for the success of the underlying business activity. Current commercial servers (such as Apache and Micr...
Mohammad Shadi Al Hakeem, Jan Richling, Gero M&uum...
IC
2003
15 years 3 months ago
Internet Collaboration Using the W3C Document Object Model
The Internet makes it possible to share information (e.g. text, image, audio, video and other formats of data) across the globe. In this paper we look at collaborative Internet en...
Xiaohong Qiu, Bryan Carpenter, Geoffrey Fox
SOCINFO
2010
15 years 26 days ago
Social Email: A Framework and Application for More Socially-Aware Communications
As online social networks (OSN) attempt to mimic real life social networks, we have made progress towards using OSNs to provide us with data to allow for richer and more robust onl...
Thomas Tran, Jeff Rowe, Shyhtsun Felix Wu
NSDI
2007
15 years 4 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...