Results 1 - 10
of
205
IO-Lite: A Unified I/O Buffering and Caching System
- ACM Transactions on Computer Systems
, 1997
"... This paper presents the design, implementation, and evaluation of IO-Lite, a unified I/O buffering and caching system. IO-Lite unifies all buffering and caching in the system, to the extent permitted by the hardware. In particular, it allows applications, interprocess communication, the filesystem, ..."
Abstract
-
Cited by 206 (14 self)
- Add to MetaCart
to their needs. IO-Lite eliminates all copying and multiple buffering of I/O data, and enables various cross-subsystem optimizations. Performance measurements show significant performance improvements on Web servers and other I/O intensive applications. 1 Introduction This paper presents the design
WebOS: Operating System Services for Wide Area Applications
"... In this paper, we demonstrate the power of providing a common set of Operating System services to wide-area applications, including mechanisms for naming, persistent storage, remote process execution, resource management, authentication, and security. On a single machine, application developers can ..."
Abstract
-
Cited by 130 (17 self)
- Add to MetaCart
In this paper, we demonstrate the power of providing a common set of Operating System services to wide-area applications, including mechanisms for naming, persistent storage, remote process execution, resource management, authentication, and security. On a single machine, application developers can
Clilets: Web Applications with Secure Client-Side Storage
"... Today's web applications require that all data be visible to the server. This is a problem in cases, such as a Web Tax service, where the user may not trust the server with the data. We present the Clilet system, a new web application system that allows sensitive data to be stored securely on t ..."
Abstract
- Add to MetaCart
Today's web applications require that all data be visible to the server. This is a problem in cases, such as a Web Tax service, where the user may not trust the server with the data. We present the Clilet system, a new web application system that allows sensitive data to be stored securely
Web servers for bulk file transfer and storage
- CHEP 06 Proceedings
, 2006
"... GridSite has extended the industrystandard Apache webserver for use within Grid projects, both by adding support for Grid security credentials such as GSI and VOMS, and with the GridHTTP protocol for bulk file transfer via HTTP. We describe how GridHTTP combines the security model of X.509/HTTPS wit ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
with the performance of Apache, in local and wide area bulk transfer applications. GridSite also supports file location within storage farms, and we explain how this has been implemented within Apache using the HTCP protocol, and the clientside commands and toolkit we have provided for applications.
Web-based attacks on host-proof encrypted storage
- In Workshop on Offensive Technologies (WOOT
, 2012
"... Cloud-based storage services, such as Wuala, and pass-word managers, such as LastPass, are examples of so-called host-proof web applications that aim to protect users from attacks on the servers that host their data. To this end, user data is encrypted on the client and the server is used only as a ..."
Abstract
-
Cited by 5 (4 self)
- Add to MetaCart
Cloud-based storage services, such as Wuala, and pass-word managers, such as LastPass, are examples of so-called host-proof web applications that aim to protect users from attacks on the servers that host their data. To this end, user data is encrypted on the client and the server is used only as a
WEB SECURITY
"... Software Engineering 4C03 ProjectThe Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure corresponds to software based communication interfaces, which are executed upon physical hardware. The main software application responsib ..."
Abstract
- Add to MetaCart
Software Engineering 4C03 ProjectThe Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure corresponds to software based communication interfaces, which are executed upon physical hardware. The main software application
Forced Protection Security Wall for Web Server on Network Attacks
"... Abstract The term web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the Internet. Here we deal with software of the server. The most common use of web servers is to host websites, but ..."
Abstract
- Add to MetaCart
Abstract The term web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the Internet. Here we deal with software of the server. The most common use of web servers is to host websites
Securing Electronic Commerce: Exposing the Weak Links
"... This paper presents the critical vulnerabilities in Web security that providers of electronic commerce will find invaluable. First, the potential impact of electronic commerce on businesses is presented. Next, the security issues for banks and other providers of electronic commerce in using the Inte ..."
Abstract
- Add to MetaCart
the Internet and the Web, in particular, are discussed. These issues include: setting up and maintaining a secure Web server, vulnerabilities in web servers, and the dangers of CGI scripts and Web applications in general. Also addressed are the client-side security issues of providing Internet access
Newspeak: A Secure Approach for Designing Web Applications
"... Internet applications are being used for more and more important business and personal purposes. Despite efforts to lock down web servers and isolate databases, there is an inherent problem in the web application architecture that leaves databases necessarily exposed to possible attack from the Inte ..."
Abstract
- Add to MetaCart
Internet applications are being used for more and more important business and personal purposes. Despite efforts to lock down web servers and isolate databases, there is an inherent problem in the web application architecture that leaves databases necessarily exposed to possible attack from
XSS Detection in Web Request and Server Response
"... Abstract-- In the today’s world most of the electronic transactions, web services run via website with stateful reliable communication by transmitting, storing, retrieving essential data on network, client and webserver. The major problem with such reliable communication is that they become vulnerab ..."
Abstract
- Add to MetaCart
literatures to find out plus minus points in existing XSS detection systems and, understanding their importance with respect to security for web applications and proposing system to prevent such attacks on client and server side named as “XSS Detection System” The proposed approach detecting the web request
Results 1 - 10
of
205