Sciweavers

449 search results - page 12 / 90
» Protecting the Hosted Application Server
Sort
View
ACSAC
2000
IEEE
14 years 5 days ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
INFOCOM
2002
IEEE
14 years 20 days ago
Topologically-Aware Overlay Construction and Server Selection
— A number of large-scale distributed Internet applications could potentially benefit from some level of knowledge about the relative proximity between its participating host no...
Sylvia Ratnasamy, Mark Handley, Richard M. Karp, S...
WEBI
2004
Springer
14 years 1 months ago
Self-Protection of Web Content
In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
Hoi Chan, Trieu C. Chieu
CRITIS
2007
13 years 9 months ago
LoRDAS: A Low-Rate DoS Attack against Application Servers
In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the servic...
Gabriel Maciá-Fernández, Jesú...
BTW
2007
Springer
164views Database» more  BTW 2007»
14 years 1 months ago
Ruminations on Multi-Tenant Databases
: This is a position paper on multi-tenant databases. As motivation, it first describes the emerging marketplace of hosted enterprise services and the importance of using multi-ten...
Dean Jacobs, Stefan Aulbach