Sciweavers

8701 search results - page 35 / 1741
» Protecting information on the Web
Sort
View
SAC
2009
ACM
14 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
35
Voted
WWW
2008
ACM
14 years 10 months ago
Organizing and sharing distributed personal web-service data
The migration from desktop applications to Web-based services is scattering personal data across a myriad of Web sites, such as Google, Flickr, YouTube, and Amazon S3. This disper...
Roxana Geambasu, Cherie Cheung, Alexander Moshchuk...
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
13 years 10 months ago
Privometer: Privacy protection in social networks
— The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information ...
Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmag...
ECOOPW
1999
Springer
14 years 2 months ago
J-Kernel: A Capability-Based Operating System for Java
Safe language technology can be used for protection within a single address space. This protection is enforced by the language’s type system, which ensures that references to obj...
Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czaj...
WWW
2005
ACM
14 years 10 months ago
An architecture for personal semantic web information retrieval system
The semantic Web and Web service technologies have provided both new possibilities and challenges to automatic information processing. There are a lot of researches on applying th...
Haibo Yu, Tsunenori Mine, Makoto Amamiya