Sciweavers

641 search results - page 87 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
LISA
2003
13 years 9 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis
COLCOM
2009
IEEE
14 years 13 days ago
Efficient dissemination of personalized video content in resource-constrained environments
— Video streaming on mobile devices such as PDA’s, laptop PCs, pocket PCs and cell phones is becoming increasingly popular. These mobile devices are typically constrained by th...
Piyush Parate, Lakshmish Ramaswamy, Suchendra M. B...
ESCIENCE
2006
IEEE
14 years 1 months ago
Adapting and Evaluating Commercial Workflow Engines for e-Science
Numerous Grid workflow engines exist, each generally specialized for a single application domain such as protein folding. Although the underlying purpose and functionality of the ...
Sharanya Eswaran, David Del Vecchio, Glenn S. Wass...
NSDI
2004
13 years 9 months ago
Session State: Beyond Soft State
The cost and complexity of administration of large systems has come to dominate their total cost of ownership. Stateless and soft-state components, such as Web servers or network ...
Benjamin C. Ling, Emre Kiciman, Armando Fox