Sciweavers

95 search results - page 9 / 19
» Trustworthy Access Control with Untrustworthy Web Servers
Sort
View
WWW
2006
ACM
14 years 7 months ago
Cat and mouse: content delivery tradeoffs in web access
Web pages include extraneous material that may be viewed as undesirable by a user. Increasingly many Web sites also require users to register to access either all or portions of t...
Balachander Krishnamurthy, Craig E. Wills
ACSAC
2001
IEEE
13 years 10 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
COMCOM
1998
74views more  COMCOM 1998»
13 years 6 months ago
Using proxies to enhance TCP performance over hybrid fiber coaxial networks
Using cable modems that operate at several hundred times the speed of conventional telephone modems, many cable operators are beginning to offer World Wide Web access and other da...
Reuven Cohen, Srinivas Ramanathan
EUROPAR
2000
Springer
13 years 10 months ago
An Architecture for Web-Based Interaction and Steering of Adaptive Parallel/Distributed Applications
This paper presents an architecture for web-based interaction and steering of parallel/distributed scientific applications. The architecture is composed of detachable thin-clients ...
Rajeev Muralidhar, Samian Kaur, Manish Parashar
WWW
2004
ACM
14 years 7 months ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger