Securing your sources

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing the "Bring Your Own Device" Policy

The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely o...

متن کامل

10 Steps to Securing Your Web Applications

You set up a firewall, run anti-virus and anti-spyware software, and regularly patch security holes in your operating system. Therefore your data is secure, right? Wrong! Sloppy programming practices can leave your data open to prying eyes. This paper describes the top 10 security vulnerabilities that can be found in today's web-based applications, and how those applications can be changed to a...

متن کامل

Securing Your Transactions: Detecting Anomalous Patterns In XML Documents

XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going cyber attack or the actions of a benign user, can potentially harm the interacting systems and therefore they are regarded as a threat. In this paper we address the problem of anomaly detection and localization in XML transactions using mac...

متن کامل

Remix in 3D Printing: What your Sources say About You

Concurrently with the recent, rapid adoption of 3D printing technologies, online sharing of 3D-printable designs is growing equally rapidly, even though it has received far less attention. We study remix relationships on Thingiverse, the dominant online repository and social network for 3D printing. We collected data of designs published over ve years, and we nd that remix ties exhibit both hom...

متن کامل

Dexter: Plugging-n-Playing with Data Sources in Your Browser

We present Dexter, a browser-based, general purpose data exploration system for end-users. Dexter enables end-users to easily query across multiple Web-accessible heterogeneous (semi-) structured data sources with higher expressivity than that is usually directly supported by the sources. A novelty of our approach lies in the client-sided evaluation of end-user queries. Our query evaluation tec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: III-Vs Review

سال: 1995

ISSN: 0961-1290

DOI: 10.1016/0961-1290(95)80139-1