Sciweavers

776 search results - page 142 / 156
» Securing user inputs for the web
Sort
View
SIGCOMM
2003
ACM
14 years 2 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
WMASH
2003
ACM
14 years 2 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
CEAS
2008
Springer
13 years 10 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 10 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
13 years 8 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner