Sciweavers

449 search results - page 20 / 90
» Protecting the Hosted Application Server
Sort
View
CCGRID
2003
IEEE
14 years 1 months ago
Building a Performance Model of Streaming Media Applications in Utility Data Center Environment
Abstract Utility Data Center (UDC) provides a exible, coste ective infrastructure to support the hosting of applications for Internet services. In order to enable the design of a \...
Ludmila Cherkasova, Loren Staley
WISTP
2010
Springer
13 years 5 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
CSFW
2011
IEEE
12 years 7 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
CCS
2009
ACM
14 years 2 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh
WISE
2007
Springer
14 years 2 months ago
Modeling Distributed Events in Data-Intensive Rich Internet Applications
Abstract. Rich Internet applications (RIAs) enable novel usage scenarios by overcoming the traditional paradigms of Web interaction. Conventional Web applications can be seen as re...
Giovanni Toffetti Carughi, Sara Comai, Alessandro ...