Sciweavers

434 search results - page 52 / 87
» Security Documentation
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
ACSAC
2002
IEEE
14 years 18 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
CEAS
2006
Springer
13 years 11 months ago
Teaching Spam and Spyware at the University of C@1g4ry
The University of Calgary is attacking the problems of spam and spyware from the angle of education. "Spam and Spyware" is a computer science course offered at both the ...
John Aycock
ICCCN
2007
IEEE
14 years 1 months ago
SCUBE: A DoS-Resistant Distributed Search Protocol
– Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromise...
Souvik Ray, Zhao Zhang
ESORICS
2009
Springer
14 years 8 months ago
Tracking Information Flow in Dynamic Tree Structures
Abstract. This paper explores the problem of tracking information flow in dynamic tree structures. Motivated by the problem of manipulating the Document Object Model (DOM) trees by...
Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov