Sciweavers

5488 search results - page 1018 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 10 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
15 years 10 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 10 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
IPPS
2005
IEEE
15 years 10 months ago
Exploiting WSRF and WSRF.NET for Remote Job Execution in Grid Environments
The Web Service Resource Framework (WSRF) was announced in January 2004 as a new way for manipulating "stateful resources" to perform grid computing tasks using Web Serv...
Glenn S. Wasson, Marty Humphrey
ISSRE
2005
IEEE
15 years 10 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
« Prev « First page 1018 / 1098 Last » Next »