Sciweavers

1323 search results - page 215 / 265
» Updatable Security Views
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
SACMAT
2003
ACM
14 years 28 days ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel
CCS
2003
ACM
14 years 28 days ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
WWW
2007
ACM
14 years 8 months ago
GeoTV: navigating geocoded rss to create an iptv experience
The Web is rapidly moving towards a platform for mass collaboration in content production and consumption from three screens: computers, mobile phones, and TVs. While there has be...
Yih-Farn Chen, Giuseppe Di Fabbrizio, David C. Gib...
CC
2009
Springer
14 years 10 days ago
Scheduling Tasks to Maximize Usage of Aggregate Variables in Place
Single-assignment languages with copy semantics have a very simple and approachable programming model. A na¨ıve implementation of the copy semantics that copies the result of eve...
Samah Abu-Mahmeed, Cheryl McCosh, Zoran Budimlic, ...