Sciweavers

867 search results - page 103 / 174
» Secure Input for Web Applications
Sort
View
IPPS
2006
IEEE
14 years 3 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
CCR
2004
155views more  CCR 2004»
13 years 9 months ago
The dark side of the Web: an open proxy's view
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web. While such interaction c...
Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming ...
CSFW
2012
IEEE
11 years 11 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
ICWS
2009
IEEE
14 years 6 months ago
Equivalence of Web Services in Process-Aware Service Compositions
Deciding on web service equivalence in process-aware service compositions is a crucial challenge throughout the composition life cycle. Restricting such decisions to (activity) la...
Stefanie Rinderle-Ma, Manfred Reichert, Martin Jur...
DAIS
2003
13 years 10 months ago
Discovering Web Services Using Behavioural Constraints and Ontology
The ability to locate useful on-line Web Services is becoming critical for today’s service-oriented business applications. A number of efforts have been put to enhance the servic...
Natenapa Sriharee, Twittie Senivongse