• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 205
Next 10 →

IO-Lite: A Unified I/O Buffering and Caching System

by Vivek S. Pai, Peter Druschel, Willy Zwaenepoel - ACM Transactions on Computer Systems , 1997
"... This paper presents the design, implementation, and evaluation of IO-Lite, a unified I/O buffering and caching system. IO-Lite unifies all buffering and caching in the system, to the extent permitted by the hardware. In particular, it allows applications, interprocess communication, the filesystem, ..."
Abstract - Cited by 206 (14 self) - Add to MetaCart
to their needs. IO-Lite eliminates all copying and multiple buffering of I/O data, and enables various cross-subsystem optimizations. Performance measurements show significant performance improvements on Web servers and other I/O intensive applications. 1 Introduction This paper presents the design

WebOS: Operating System Services for Wide Area Applications

by Amin Vahdat , Thomas Anderson, Michael Dahlin, Eshwar Belani, David Culler, Paul Eastham , Chad Yoshikawa
"... In this paper, we demonstrate the power of providing a common set of Operating System services to wide-area applications, including mechanisms for naming, persistent storage, remote process execution, resource management, authentication, and security. On a single machine, application developers can ..."
Abstract - Cited by 130 (17 self) - Add to MetaCart
In this paper, we demonstrate the power of providing a common set of Operating System services to wide-area applications, including mechanisms for naming, persistent storage, remote process execution, resource management, authentication, and security. On a single machine, application developers can

Clilets: Web Applications with Secure Client-Side Storage

by Robert Fischer, Robert Fischer, Margo Seltzer
"... Today's web applications require that all data be visible to the server. This is a problem in cases, such as a Web Tax service, where the user may not trust the server with the data. We present the Clilet system, a new web application system that allows sensitive data to be stored securely on t ..."
Abstract - Add to MetaCart
Today's web applications require that all data be visible to the server. This is a problem in cases, such as a Web Tax service, where the user may not trust the server with the data. We present the Clilet system, a new web application system that allows sensitive data to be stored securely

Web servers for bulk file transfer and storage

by A. Mcnab, S. Kaushal, Yibiao Li - CHEP 06 Proceedings , 2006
"... GridSite has extended the industrystandard Apache webserver for use within Grid projects, both by adding support for Grid security credentials such as GSI and VOMS, and with the GridHTTP protocol for bulk file transfer via HTTP. We describe how GridHTTP combines the security model of X.509/HTTPS wit ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
with the performance of Apache, in local and wide area bulk transfer applications. GridSite also supports file location within storage farms, and we explain how this has been implemented within Apache using the HTCP protocol, and the clientside commands and toolkit we have provided for applications.

Web-based attacks on host-proof encrypted storage

by Karthikeyan Bhargavan, Antoine Delignat-lavaud, Ens Cachan - In Workshop on Offensive Technologies (WOOT , 2012
"... Cloud-based storage services, such as Wuala, and pass-word managers, such as LastPass, are examples of so-called host-proof web applications that aim to protect users from attacks on the servers that host their data. To this end, user data is encrypted on the client and the server is used only as a ..."
Abstract - Cited by 5 (4 self) - Add to MetaCart
Cloud-based storage services, such as Wuala, and pass-word managers, such as LastPass, are examples of so-called host-proof web applications that aim to protect users from attacks on the servers that host their data. To this end, user data is encrypted on the client and the server is used only as a

WEB SECURITY

by Oriana Kondakciu
"... Software Engineering 4C03 ProjectThe Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure corresponds to software based communication interfaces, which are executed upon physical hardware. The main software application responsib ..."
Abstract - Add to MetaCart
Software Engineering 4C03 ProjectThe Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure corresponds to software based communication interfaces, which are executed upon physical hardware. The main software application

Forced Protection Security Wall for Web Server on Network Attacks

by Homer Benny Bandela , G Samuel Vara , Prasad Raju , T R S Prasad Babu
"... Abstract The term web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the Internet. Here we deal with software of the server. The most common use of web servers is to host websites, but ..."
Abstract - Add to MetaCart
Abstract The term web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the Internet. Here we deal with software of the server. The most common use of web servers is to host websites

Securing Electronic Commerce: Exposing the Weak Links

by Anup K. Ghosh, Ph. D
"... This paper presents the critical vulnerabilities in Web security that providers of electronic commerce will find invaluable. First, the potential impact of electronic commerce on businesses is presented. Next, the security issues for banks and other providers of electronic commerce in using the Inte ..."
Abstract - Add to MetaCart
the Internet and the Web, in particular, are discussed. These issues include: setting up and maintaining a secure Web server, vulnerabilities in web servers, and the dangers of CGI scripts and Web applications in general. Also addressed are the client-side security issues of providing Internet access

Newspeak: A Secure Approach for Designing Web Applications

by Kyle Dent, Steven M. Bellovin
"... Internet applications are being used for more and more important business and personal purposes. Despite efforts to lock down web servers and isolate databases, there is an inherent problem in the web application architecture that leaves databases necessarily exposed to possible attack from the Inte ..."
Abstract - Add to MetaCart
Internet applications are being used for more and more important business and personal purposes. Despite efforts to lock down web servers and isolate databases, there is an inherent problem in the web application architecture that leaves databases necessarily exposed to possible attack from

XSS Detection in Web Request and Server Response

by Sudhir S. Dhekane, Prof V. B. Gaikwad
"... Abstract-- In the today’s world most of the electronic transactions, web services run via website with stateful reliable communication by transmitting, storing, retrieving essential data on network, client and webserver. The major problem with such reliable communication is that they become vulnerab ..."
Abstract - Add to MetaCart
literatures to find out plus minus points in existing XSS detection systems and, understanding their importance with respect to security for web applications and proposing system to prevent such attacks on client and server side named as “XSS Detection System” The proposed approach detecting the web request
Next 10 →
Results 1 - 10 of 205
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University