Sciweavers

136 search results - page 17 / 28
» Deriving Enforcement Mechanisms from Policies
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
RAID
2007
Springer
14 years 1 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 7 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
SEMWEB
2009
Springer
14 years 2 months ago
Policy-Aware Content Reuse on the Web
The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research d...
Oshani Seneviratne, Lalana Kagal, Tim Berners-Lee
INFOCOM
2000
IEEE
13 years 12 months ago
Differentiated Admission Control in Large Networks
Abstract—This paper proposes a simple but effective admission control algorithm for integrated services packet networks. The admission control scheme, based on stochastic control...
Cedric Adjih, Philippe Jacquet, Philippe Robert