Sciweavers

906 search results - page 110 / 182
» Controlling Control Flow in Web Applications
Sort
View
PERCOM
2011
ACM
13 years 17 days ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
ICIW
2009
IEEE
14 years 3 months ago
An Adaptive Scheduling Policy for Staged Applications
The performance of Web servers and application servers is a crucial factor for the success of the underlying business activity. Current commercial servers (such as Apache and Micr...
Mohammad Shadi Al Hakeem, Jan Richling, Gero M&uum...
IC
2003
13 years 10 months ago
Internet Collaboration Using the W3C Document Object Model
The Internet makes it possible to share information (e.g. text, image, audio, video and other formats of data) across the globe. In this paper we look at collaborative Internet en...
Xiaohong Qiu, Bryan Carpenter, Geoffrey Fox
SOCINFO
2010
13 years 7 months ago
Social Email: A Framework and Application for More Socially-Aware Communications
As online social networks (OSN) attempt to mimic real life social networks, we have made progress towards using OSNs to provide us with data to allow for richer and more robust onl...
Thomas Tran, Jeff Rowe, Shyhtsun Felix Wu
NSDI
2007
13 years 11 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...