Sciweavers

2024 search results - page 10 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
NCA
2009
IEEE
15 years 11 months ago
Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Serv
Abstract—Resource management is a key challenge that service providers must adequately face in order to ensure their profitability. This paper describes a proof-of-concept frame...
Iñigo Goiri, Ferran Julià, Jorge Eja...
SAC
2009
ACM
15 years 11 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
OTM
2004
Springer
15 years 10 months ago
Application of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile...
Allan Tomlinson, Scarlet Schwiderski-Grosche
NDSS
2009
IEEE
15 years 11 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
MIDDLEWARE
2007
Springer
15 years 11 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt