Securing your sources
نویسندگان
چکیده
منابع مشابه
Securing the "Bring Your Own Device" Policy
The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely o...
متن کامل10 Steps to Securing Your Web Applications
You set up a firewall, run anti-virus and anti-spyware software, and regularly patch security holes in your operating system. Therefore your data is secure, right? Wrong! Sloppy programming practices can leave your data open to prying eyes. This paper describes the top 10 security vulnerabilities that can be found in today's web-based applications, and how those applications can be changed to a...
متن کاملSecuring Your Transactions: Detecting Anomalous Patterns In XML Documents
XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going cyber attack or the actions of a benign user, can potentially harm the interacting systems and therefore they are regarded as a threat. In this paper we address the problem of anomaly detection and localization in XML transactions using mac...
متن کاملRemix in 3D Printing: What your Sources say About You
Concurrently with the recent, rapid adoption of 3D printing technologies, online sharing of 3D-printable designs is growing equally rapidly, even though it has received far less attention. We study remix relationships on Thingiverse, the dominant online repository and social network for 3D printing. We collected data of designs published over ve years, and we nd that remix ties exhibit both hom...
متن کاملDexter: Plugging-n-Playing with Data Sources in Your Browser
We present Dexter, a browser-based, general purpose data exploration system for end-users. Dexter enables end-users to easily query across multiple Web-accessible heterogeneous (semi-) structured data sources with higher expressivity than that is usually directly supported by the sources. A novelty of our approach lies in the client-sided evaluation of end-user queries. Our query evaluation tec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: III-Vs Review
سال: 1995
ISSN: 0961-1290
DOI: 10.1016/0961-1290(95)80139-1