Sciweavers

956 search results - page 17 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
SBBD
2004
150views Database» more  SBBD 2004»
13 years 9 months ago
Active XML, Security and Access Control
XML and Web services are revolutioning the automatic management of distributed information, somewhat in the same way that HTML, Web browsers and search engines modified human acce...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, T...
IJCAI
2003
13 years 9 months ago
Web Page Cleaning for Web Mining through Feature Weighting
Unlike conventional data or text, Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g., banner ads, navigation bars, ...
Lan Yi, Bing Liu
WCE
2007
13 years 9 months ago
Web Mining: Strategic Web Site Design for Small Business
- Websites are used to establish the company’s policy and image, to promote and sell goods or support services and to provide customer support and to facilitate the communication...
Mohammad A. A. Alhawamdeh
ACSAC
2004
IEEE
14 years 6 days ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 8 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...