enter search term and/or author name
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad, Patrick Traynor
Article No.: 1
HTTP cookies are the de facto mechanism for session authentication in Web applications. However, their inherent security weaknesses allow attacks against the integrity of Web sessions. HTTPS is often recommended to protect cookies, but deploying...
Minersoft: Software retrieval in grid and cloud computing infrastructures
Marios D. Dikaiakos, Asterios Katsifodimos, George Pallis
Article No.: 2
One of the main goals of Cloud and Grid infrastructures is to make their services easily accessible and attractive to end-users. In this article we investigate the problem of supporting keyword-based searching for the discovery of software files...
In order to improve scalability and to reduce the maintenance overhead for structured peer-to-peer (P2P) networks, researchers have proposed architectures based on several interconnection networks with a fixed-degree and a logarithmical diameter....