Sciweavers

381 search results - page 26 / 77
» Timing attacks on Web privacy
Sort
View
ECWEB
2009
Springer
112views ECommerce» more  ECWEB 2009»
14 years 2 months ago
Towards Privacy Compliant and Anytime Recommender Systems
Abstract. Recommendation technologies have traditionally been used in domains such as E-commerce and Web navigation to recommend resources to customers so as to help them to get th...
Armelle Brun, Anne Boyer
ACSAC
2005
IEEE
14 years 1 months ago
Defensive Execution of Transactional Processes against Attacks
It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the...
Meng Yu, Wanyu Zang, Peng Liu
CCS
2011
ACM
12 years 7 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
ASIAN
2007
Springer
157views Algorithms» more  ASIAN 2007»
14 years 1 months ago
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
Abstract. We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faul...
Elie Bursztein, Jean Goubault-Larrecq
SOUPS
2006
ACM
14 years 1 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...