Sciweavers

391 search results - page 69 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
CHI
2008
ACM
14 years 9 months ago
Mischief: supporting remote teaching in developing regions
Mischief is a system to support traditional classroom practices between a remote instructor and a group of collocated students. Meant for developing regions, each student in the c...
Neema Moraveji, Taemie Kim, James Ge, Udai Singh P...
HPDC
2005
IEEE
14 years 2 months ago
411 on scalable password service
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 10 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
SAC
2009
ACM
14 years 3 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...