4,215 Hits in 8.5 sec

SCoT: A secure content-oriented transport

Ivan Vidal, Jaime Garcia-Reinoso, Ignacio Soto, Francisco Valera, Diego Lopez
2018 Journal of Network and Computer Applications  
the content to third parties, and current security solutions, such as TLS and IPsec, do not allow authenticating the original content provider or the content itself in these scenarios.  ...  Content authentication procedures are executed transparently to end-user applications.  ...  The work of Ignacio Soto has partially been supported by the Spanish Texeo project (TEC2016-80339-R) funded by the Spanish Ministry of Economy and Competitiveness.  ... 
doi:10.1016/j.jnca.2018.01.001 fatcat:oxnqy6q7erdj7eer5tcaiep4xy

DeCore: Detecting Content Repurposing Attacks on Clients' Systems [chapter]

Smitha Sundareswaran, Anna C. Squicciarini
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We design and develop an approach that protects from content repurposing attacks at the client end.  ...  In this paper, we discuss an emerging class of attacks, namely content repurposing attacks, which specifically targets sites that host user uploaded content on Web 2.0 sites.  ...  Acknowledgements The work reported in this paper has been partially supported by the NSF grant CNS 08-31247 (2008-2012).  ... 
doi:10.1007/978-3-642-16161-2_12 fatcat:cygoldgmi5gvveckuwrepxkea4

Curl: a language for web content

Steve Ward, Mat Hostetter
2003 International Journal of Web Engineering and Technology  
of alternative, incompatible content representation technologies such as Javascript and Java.  ...  Several characteristics were identified as critical to the success of the desired universal content language. These included: Extensibility.  ...  Both Curl and this paper owe their existence to the efforts of the uniquely talented team at this unusual company. The fruits of this continuing work is available at [5] .  ... 
doi:10.1504/ijwet.2003.003259 fatcat:lvnv5tmg5bhgbckqs6slltjaka

Contents Page

2013 Epidemiologic Reviews  
Currently the DIP working draft version 2 includes a Java binding for the DIBOs and a specification of a Java execution environment for Java DIxOs, J-DIxOs.  ...  The OPIMA specification is device and content independent. Content includes all multimedia types and executables.  ...  SMPTE Metadata dictionary structure is defined in SMPTE 335M while the associated Metadata Dictionary Contents Recommended practice defines a registered set of metadata element descriptions for association  ... 
doi:10.1093/epirev/mxs015 fatcat:tkblkwc5rvgorayu3f5cv5dxaa

Content Change Management: Problems for Web Systems [chapter]

Susan Dart
1999 Lecture Notes in Computer Science  
CCM will need to control the static content that goes into the web system along with the dynamic content that is created during execution of the web system.  ...  Delivery system: download content to user or resource e.g., download upgrades or plug-ins Customized access: access is via a customized interface or based on user's preferences e.g., my customized view  ...  She is a member of the Program Committees for the International Conferences on Web Engineering and on CM.  ... 
doi:10.1007/3-540-48253-9_1 fatcat:xgjhyoahsjcujfozsikndkd4wm

Content Sharing for Mobile Devices [article]

Rudi Ball
2008 arXiv   pre-print
Within the report we describe how the MCP is simulated with a superimposed geographic framework on top of the JiST (Java in Simulation Time) framework to evaluate and measure its capability to share content  ...  The owners and creators of local content are motivated to share this content in ever increasing volume; the conclusion has been that social networks sites are seeing a revolution in the sharing of information  ...  Security issues hamper the speed and efficiency content sharing models.  ... 
arXiv:0809.4395v1 fatcat:cxybzlhqgvhipk2j6j4uyrbxny

Pervasive content-centric wireless networking

Hanno Wirtz, Matteo Ceriotti, Benjamin Grap, Klaus Wehrle
2014 Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014  
Realizing content discovery outside of secure network associations, SO-Fi supports usecase-specific communication security, i.e., confidentiality, WPA2 network security, DoS robustness, and user authentication  ...  This network-centric paradigm incurs substantial communication and time overhead, as devices build knowledge of content availability only after blindly associating to a network.  ...  ACKNOWLEDGEMENTS This work was funded by the Deutsche Forschungsgemeinschaft (DFG) and the DFG Cluster of Excellence on Ultra High-Speed Mobile Information and Communication (UMIC).  ... 
doi:10.1109/wowmom.2014.6918968 dblp:conf/wowmom/WirtzCGW14 fatcat:k2qi3guhgjee7fingzzfrmguze

User-provided multimedia content distribution architecture in mobile and ubiquitous communication networks

Chih-Lin Hu, Chien-An Cho
2011 Journal of Network and Computer Applications  
The proposed architecture integrates several specific mechanisms, including device discovery, asynchronous content delivery, secure access control, and virtual file system.  ...  This design addresses several inherent limitations in wireless and mobile networks, and enables mobile users to transfer media content in a secure, mobile, and energy-saving way.  ...  to execute the indicated procedure.  ... 
doi:10.1016/j.jnca.2010.08.010 fatcat:bz3mkt5du5btncfqpo2x6bw57q

Self-organized customized content delivery architecture for ambient assisted environments

Muaz A. Niazi
2008 Proceedings of the third international workshop on Use of P2P, grid and agents for the development of content networks - UPGRADE '08  
We demonstrate how physical peers made up of a Bluetooth-based network of Java-enabled mobile phones can be used to provide customized content delivery from the web without the need of a dedicated web  ...  The algorithms are to be applied to mobile phones with Bluetooth capability to discover net connectivity for peer-to-peer access to a content delivery network.  ...  One the other, we are actually developing the peer agents software using Java, J2ME (Java 2 Micro Edition) and JABWT.  ... 
doi:10.1145/1384209.1384218 dblp:conf/hpdc/Niazi08 fatcat:kmmhc3vx5rebhofzmidjxcrr7u

Design of Testbed for Agile Computing of MapReduce Applications by using Docker

Yunhee Kang
2016 International Journal of Contents  
Basically, this is the first attempt towards automatic configuration of Twister jobs on a container-based cloud platform VM for many workloads.  ...  In this study, we have chosen this specific tool due to the increasing popularity of MapReduce and cloud container technologies such as Docker.  ...  ACKNOWLEDGEMENT This work was supported by the research fund of Baekseok University (2016).  ... 
doi:10.5392/ijoc.2016.12.3.029 fatcat:5xzy5bs4vjgavkfiv3x7ezb2nq

Privacy-Preserving Content-Based Image Retrieval in the Cloud [article]

Bernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos
2015 arXiv   pre-print
We have built a prototype of the proposed framework, formally analyzed and proven its security properties, and experimentally evaluated its performance and precision.  ...  Our solution enables both encrypted storage and querying using Content Based Image Retrieval (CBIR) while preserving privacy.  ...  Our security proof and the idealized functionality follow the real/ideal paradigm that is standard in secure multi-party computations [26] .  ... 
arXiv:1411.4862v3 fatcat:bnbvk7erjnhurmrobcuizxplna

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems

Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
In this paper, we discuss security weaknesses of the interface between app code and web content through attacks, then introduce defenses that can be deployed without modifying the OS.  ...  These policies recognize fine-grained security principals, such as origins, and control all interactions between apps and the web.  ...  INTRODUCTION A common app design paradigm is to embed web content directly in an app's UI.  ... 
doi:10.1145/3052973.3052998 dblp:conf/ccs/DavidsonCGLJ17 fatcat:wq7eovz2trgqdjb4o5pqevgscm

E-Commerce Security: No Silver Bullet [chapter]

Anup K. Ghosh
1999 Database Security XII  
Acknowledgments This work has been supported by the Advanced Technology Program of NIST under Cooperative Agreement # 70NANB7H3049.  ...  Executable content Executable content poses privacy and security risks to end users, too. Java applets, ActiveX controls, Javascripts, and VBscripts are alI examples of executable content.  ...  The final type of executable content to be considered here is known as push technology. Push technology turns the Web paradigm on its head.  ... 
doi:10.1007/978-0-387-35564-1_1 fatcat:5ry5zyy3w5aerapptgmiltyeo4

A case for virtualization of Content Delivery Networks

Andre Moreira, Josilene Moreira, Djamel Sadok, Arthur Callado, Moises Rodrigues, Marcio Neves, Victor Souza, Per P. Karlsson
2011 Proceedings of the 2011 Winter Simulation Conference (WSC)  
Content Delivery Networks have gained a popular role among application service providers (ASPs) and infrastructural companies.  ...  In this paper, we introduce the idea of CDN virtualization.  ...  Simulation tool Our Simulator was completely implemented in Java 6 and uses the Object-Oriented paradigm to represent the components and interactions of a CDN and network structure.  ... 
doi:10.1109/wsc.2011.6148016 dblp:conf/wsc/MoreiraMSCRNSK11 fatcat:wrryth2gdvbqxntgvxtudolmla


2009 Issues in Information Systems  
However, the Secure Programming Paradigm may present challenges in the choice of programming language or the required level of programming prerequisites that may not be appropriate for an Information Systems  ...  As an alternative, the Automated Web Application Testing Paradigm using IBM's AppScan web security testing tool presents web application security from a quality assurance and testing perspective that may  ...  The Automated Web Application Security Paradigm is a better fit for the Information Systems Curriculum than the Secured Programming paradigm alternative.  ... 
doi:10.48009/1_iis_2009_87-96 fatcat:7esjuju2ojbupgwkao5rbnkwca
« Previous Showing results 1 — 15 out of 4,215 results