Sciweavers

2024 search results - page 340 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
EUROCRYPT
2007
Springer
15 years 8 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
CCS
2007
ACM
15 years 10 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
OOPSLA
2007
Springer
15 years 10 months ago
Scalable omniscient debugging
Omniscient debuggers make it possible to navigate backwards in time within a program execution trace, drastically improving the task of debugging complex applications. Still, they...
Guillaume Pothier, Éric Tanter, José...
DSN
2008
IEEE
15 years 11 months ago
WS-DREAM: A distributed reliability assessment Mechanism for Web Services
It is critical to guarantee the reliability of serviceoriented applications. This is because they may employ remote Web Services as components, which may easily become unavailable...
Zibin Zheng, Michael R. Lyu
DSN
2007
IEEE
15 years 10 months ago
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services
New versions of existing large-scale web services such as Passport.com© have to go through rigorous performance evaluations in order to ensure a high degree of availability. Perf...
Marcelo De Barros, Jing Shiau, Chen Shang, Kenton ...