Sciweavers

776 search results - page 57 / 156
» Securing user inputs for the web
Sort
View
JDWM
2010
139views more  JDWM 2010»
13 years 7 months ago
Mining Frequent Generalized Patterns for Web Personalization in the Presence of Taxonomies
The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usagebased approach to generate recommendations that ...
Panagiotis Giannikopoulos, Iraklis Varlamis, Magda...
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
14 years 23 days ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
FC
2007
Springer
141views Cryptology» more  FC 2007»
14 years 3 months ago
WSKE: Web Server Key Enabled Cookies
In this paper, we present the design and prototype of a new approach to cookie management: if a server deposits a cookie only after authenticating itself via the SSL handshake, the...
Chris Masone, Kwang-Hyun Baek, Sean W. Smith
CIKM
2010
Springer
13 years 6 months ago
Research proposal for distributed deep web search
This proposal identifies two main problems related to deep web search, and proposes a step by step solution for each of them. The first problem is about searching deep web content...
Kien-Tsoi T. E. Tjin-Kam-Jet
ICWS
2009
IEEE
14 years 6 months ago
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection
Websites serve content both through Web Services as well as through user-viewable webpages. While the consumers of web-services are typically ‘machines’, webpages are meant fo...
Varun Bhagwan, Tyrone Grandison