Sciweavers

1780 search results - page 217 / 356
» Polymorphic Contention Management
Sort
View
CCS
2010
ACM
13 years 11 months ago
Protecting browsers from cross-origin CSS attacks
Cross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defen...
Lin-Shung Huang, Zack Weinberg, Chris Evans, Colli...
IJWBC
2008
120views more  IJWBC 2008»
13 years 10 months ago
Internet governance: towards a non-representational democracy
: Internet governance is a contentious topic referring to the global control and management of key internet resources such as IP addresses. Research suggests that the existence of ...
Martin Hans Knahl, Geoff Cox
OIR
2008
103views more  OIR 2008»
13 years 10 months ago
ScienceTreks: an autonomous digital library system
The support for automation of the annotation process of large corpora of digital content is crucial for the success of semanticaware services in the digital library domain. In this...
Alexander Ivanyukovich, Maurizio Marchese, Fausto ...
JSW
2007
90views more  JSW 2007»
13 years 10 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
DQ
1998
145views more  DQ 1998»
13 years 10 months ago
Data Quality in the Database Systems Course
Current evidence indicates that poor data quality is pervasive and has a significant negative impact on business success. Information-system (IS) professionals are typically charg...
Richard G. Mathieu, Omar Khalil