Sciweavers

8701 search results - page 70 / 1741
» Protecting information on the Web
Sort
View
WWW
2007
ACM
14 years 10 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
OOPSLA
1992
Springer
14 years 2 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
ISSE
2008
13 years 11 months ago
Challenges for the Protection of Critical ICT-Based Financial Infrastructures
Abstract: This paper, entitled Challenges for the Protection of Critical ICTBased Financial Infrastructures for the next 5 years, will describe the outcomes of a recently held work...
Bernhard M. Hämmerli, Henning H. Arendt
AIPS
1994
13 years 11 months ago
Synthesizing Protection Monitors from Causal Structure
Protection monitors synthesized from plan causal structure provide execution systems with information necessary to detect potential failures early during execution. By detecting e...
Glen A. Reece, Austin Tate
IAT
2007
IEEE
14 years 4 months ago
A Design of Client Side Information Management Method for Web Services Collaboration
In this paper, we propose a client side information management method for web services collaboration. Recently, personalization is one of the most challenging topics of the web te...
Hajime Hotta, Takashi Nozawa, Masafumi Hagiwara