Sciweavers

206 search results - page 27 / 42
» Managing Trust in a Peer-2-Peer Information System
Sort
View
INFOSCALE
2009
ACM
14 years 1 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
SACMAT
2003
ACM
14 years 20 days ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
SCS
2004
13 years 8 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay
POPL
1999
ACM
13 years 11 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni