Sciweavers

352 search results - page 58 / 71
» Role-based Access Control on the Web Using LDAP
Sort
View
EUROSYS
2010
ACM
14 years 1 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
SEMWEB
2004
Springer
14 years 2 months ago
SemanticOrganizer: A Customizable Semantic Repository for Distributed NASA Project Teams
SemanticOrganizer is a collaborative knowledge management system designed to support distributed NASA projects, including multidisciplinary teams of scientists, engineers, and acci...
Richard M. Keller, Daniel C. Berrios, Robert E. Ca...
MASCOTS
2001
13 years 10 months ago
Improving Ensemble-TCP Performance on Asymmetric Networks
For the World Wide Web, the Transmission Control Protocol (TCP) and the HyperText Transfer Protocol (HTTP) are two important protocols. However, interactions between these two pro...
Qian Wu, Carey L. Williamson
WWW
2009
ACM
14 years 9 months ago
Retaining personal expression for social search
Web is being extensively used for personal expression, which includes ratings, reviews, recommendations, blogs. This user created content, e.g. book review on Amazon.com, becomes ...
Praphul Chandra, Ajay Gupta
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 8 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks