Sciweavers

2673 search results - page 432 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
SAC
2009
ACM
14 years 4 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
CCS
2008
ACM
13 years 11 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
BROADNETS
2006
IEEE
14 years 3 months ago
Accuracy and Dynamics of Hash-Based Load Balancing Algorithms for Multipath Internet Routing
— This paper studies load balancing for multipath Internet routing. We focus on hash-based load balancing algorithms that work on the flow level to avoid packet reordering which...
Rüdiger Martin, Michael Menth, Michael Hemmke...
IPPS
2006
IEEE
14 years 3 months ago
Workflow fine-grained concurrency with automatic continuation
Workflow enactment systems are becoming an effective solution to ease programming, deployment and execution of distributed applications in several domains such as telecommunicatio...
Giancarlo Tretola, Eugenio Zimeo
WECWIS
2000
IEEE
155views ECommerce» more  WECWIS 2000»
14 years 1 months ago
Distributed and Scalable XML Document Processing Architecture for E-Commerce Systems
XML has become a very important emerging standard for E-commerce because of its flexibility and universality. Many software designers are actively developing new systems to handle...
David Wai-Lok Cheung, Sau Dan Lee, Thomas Lee, Wil...