Sciweavers

338 search results - page 46 / 68
» Operational Models for Reputation Servers
Sort
View
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 7 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
ISSTA
2009
ACM
14 years 2 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
P2P
2006
IEEE
135views Communications» more  P2P 2006»
14 years 1 months ago
Ordered Slicing of Very Large-Scale Overlay Networks
Recently there has been an increasing interest to harness the potential of P2P technology to design and build rich environments where services are provided and multiple applicatio...
Márk Jelasity, Anne-Marie Kermarrec
IMC
2006
ACM
14 years 1 months ago
Web search clickstreams
Search engines are a vital part of the Web and thus the Internet infrastructure. Therefore understanding the behavior of users searching the Web gives insights into trends, and en...
Nils Kammenhuber, Julia Luxenburger, Anja Feldmann...