Sciweavers

1597 search results - page 266 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ISW
2009
Springer
14 years 2 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
SIGCOMM
2009
ACM
14 years 2 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain
ESWS
2007
Springer
14 years 1 months ago
Empowering Software Maintainers with Semantic Web Technologies
Abstract. Software maintainers routinely have to deal with a multitude of artifacts, like source code or documents, which often end up disconnected, due to their different represen...
René Witte, Yonggang Zhang, Juergen Rilling
PLDI
2011
ACM
12 years 10 months ago
Language-independent sandboxing of just-in-time compilation and self-modifying code
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Jason Ansel, Petr Marchenko, Úlfar Erlingss...