Sciweavers

449 search results - page 45 / 90
» Protecting the Hosted Application Server
Sort
View
CSREASAM
2008
13 years 9 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
LISA
2004
13 years 9 months ago
Solaris Zones: Operating System Support for Consolidating Commercial Workloads
Server consolidation, which allows multiple workloads to run on the same system, has become increasingly important as a way to improve the utilization of computing resources and r...
Daniel Price, Andrew Tucker
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
MMMACNS
2005
Springer
14 years 1 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
QOFIS
2001
Springer
14 years 8 days ago
Approaches to Support Differentiated Quality of Web Service
The exponential rise in the number of Web users has inspired the creation of a diversity of Web applications. Hence, Web Quality of Service (QoS) is an increasingly critical issue ...
Sook-Hyun Ryu, Jae-Young Kim, James Won-Ki Hong