Sciweavers

449 search results - page 51 / 90
» Protecting the Hosted Application Server
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 7 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
SAC
2005
ACM
14 years 1 months ago
Handling run-time updates in distributed applications
The server side of business software systems is commonly implemented today by an ensemble of Java classes distributed over several hosts. In this scenario, it is often necessary, ...
Marco Milazzo, Giuseppe Pappalardo, Emiliano Tramo...
DKE
2007
130views more  DKE 2007»
13 years 7 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
TMRA
2007
Springer
14 years 2 months ago
Topincs Wiki - A Topic Maps Powered Wiki
Abstract. Topincs provides a RESTful web service interface for retrieval and manipulation of topic maps. A Topincs Server implementing the interface can host many stores, which are...
Robert Cerny
IPPS
2005
IEEE
14 years 1 months ago
Securely Replicated Web Documents
In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delive...
Bogdan C. Popescu, Maarten van Steen, Bruno Crispo...