Sciweavers

2207 search results - page 12 / 442
» Security at the Internet Layer
Sort
View
92
Voted
AGENTS
1998
Springer
15 years 7 months ago
Agents for Collecting Application Usage Data Over the Internet
David M. Hilbert, David F. Redmiles
104
Voted
ACSAC
1996
IEEE
15 years 7 months ago
Mandatory Protection for Internet Server Software
Richard E. Smith
136
Voted
IEEEAMS
2003
IEEE
15 years 8 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
118
Voted
WWW
2010
ACM
15 years 8 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
82
Voted
INTERNET
2008
144views more  INTERNET 2008»
15 years 3 months ago
A Brief Introduction to Usable Security
Bryan D. Payne, W. Keith Edwards