Sciweavers

377 search results - page 63 / 76
» Protection mechanisms for application service hosting platfo...
Sort
View
IJRR
2000
129views more  IJRR 2000»
13 years 7 months ago
Development and Control of a Holonomic Mobile Robot for Mobile Manipulation Tasks
International Journal of Robotics Research, v 19, n 11, p. 1066-1074 Mobile manipulator systems hold promise in many industrial and service applications including assembly, inspec...
Robert Holmberg, Oussama Khatib
SAC
2006
ACM
14 years 1 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
ICEIS
2003
IEEE
14 years 28 days ago
Distributed Overload Control for Real-Time Replicated Database Systems
: In order to meet their temporal constraints, current applications such as Web-based services and electronic commerce use the technique of data replication. To take the replicatio...
Samia Saad-Bouzefrane, Claude Kaiser
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
SASN
2003
ACM
14 years 27 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi