Reframing Security for the Web (English)
- New search for: Myers, A.
- New search for: Myers, A.
In:
COMMUNICATIONS- ACM
;
52
, 6
;
82
;
2009
-
ISSN:
- Article (Journal) / Print
-
Title:Reframing Security for the Web
-
Contributors:Myers, A. ( author )
-
Published in:COMMUNICATIONS- ACM ; 52, 6 ; 82
-
Publisher:
- New search for: ACM ASSOCIATION FOR COMPUTING MACHINERY
-
Publication date:2009-01-01
-
Size:82 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 510 / 004 / 005
- Further information on Dewey Decimal Classification
-
Classification:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 52, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 5
-
ACM-W Letter - ACM-W Celebrates Women in ComputingWeyuker, Elaine et al. | 2009
- 5
-
ACM-W Celebrates Women in ComputingWeyuker, E. et al. | 2009
- 9
-
Letters To The Editor - Share the Threats| 2009
- 10
-
blog@CACM - Speech-Activated User Interfaces and Climbing Mt. Exascale - Tessa Lau discusses why she doesn't use the touch screen on her in-car GPS unit anymore and Daniel Reed considers the future of exascale computing.| 2009
- 12
-
CACM Online - Making That ConnectionRoman, David et al. | 2009
- 13
-
News - Micromedicine to the Rescue - Medical researchers have long dreamed of "magic bullets" that go directly where they are needed. With micromedicine, this dream could become a life-saving reality.Monroe, Don et al. | 2009
- 13
-
Micromedicine to the Rescue: Medical researchers have long dreamed of ``magic bullets'' that go directly where they are neededMonroe, D. et al. | 2009
- 16
-
Content Control - Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it comes to preventing piracy. Fortunately, change is on the way.Hoffmann, Leah et al. | 2009
- 16
-
Content Control: Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it comes to preventing piracyHoffmann, L. et al. | 2009
- 18
-
Autonomous Helicopters - Researchers are improving unmanned helicopters' capabilities to address regulatory requirements and commercial uses.Goth, Gregory et al. | 2009
- 21
-
Looking Backward and Forward - CRA's Computing Community Consortium hosted a day-long symposium to discuss the important computing advances of the last several decades and how to sustain that track record of innovation.Violino, Bob et al. | 2009
- 22
-
Answering the Wrong Questions Is No Answer: Asking the wrong questions when building and deploying systems results in systems that cannot be sufficiently protected against the threats they faceSpafford, E.H. et al. | 2009
- 22
-
Viewpoints - Privacy and Security - Answering the Wrong Questions Is No Answer - Asking the wrong questions when building and deploying systems results in systems that cannot be sufficiently protected against the threats they face.Spafford, Eugene H. et al. | 2009
- 25
-
Inside Risks - Reducing Risks of Implantable Medical Devices - A prescription to improve security and privacy of pervasive health care.Fu, Kevin et al. | 2009
- 25
-
Reducing Risks of Implantable Medical Devices: A prescription to improve security and privacy of pervasive health careFu, K. et al. | 2009
- 27
-
Calendar| 2009
- 28
-
Beyond Computational Thinking: If we are not careful, our fascination with ``computational thinking'' may lead us back into the trap we are trying to escapeDenning, P.J. et al. | 2009
- 28
-
The Profession of IT - Beyond Computational Thinking - If we are not careful, our fascination with "computational thinking" may lead us back into the trap we are trying to escape.Denning, Peter J. et al. | 2009
- 31
-
Viewpoint - Why "Open Source" Misses the Point of Free Software - Decoding the important differences in terminology, underlying philosophy, and value systems between two similar categories of software.Stallman, Richard et al. | 2009
- 31
-
Why ``Open Source'' Misses the Point of Free Software: Decoding the important differences in terminology, underlying philosophy, and value systems between two similar categories of softwareStallman, R. et al. | 2009
- 34
-
Obvious Truths: How to determine when to put the brakes on late-running projects and untested software patchesNeville-Neil, G.V. et al. | 2009
- 34
-
Kode Vicious - Obvious Truths - How to determine when to put the brakes on late-running projects and untested software patches.Neville-Neil, George V. et al. | 2009
- 38
-
Practice - Hard-Disk Drives: The Good, the Bad, and the Ugly - New drive technologies and increased capacities create new categories of failure modes that will influence system designs.Elerath, Jon et al. | 2009
- 38
-
Hard-Disk Drives: The Good, the Bad, and the Ugly: New drive technologies and increased capacities create new categories of failure modes that will influence system designsElerath, J. et al. | 2009
- 46
-
Network Front-end Processors, Yet Again - The history of NFE processors sheds light on the trade-offs involved in designing network stack software.O'Dell, Mike et al. | 2009
- 51
-
Whither Sockets? High bandwidth, low latency, and multihoming challenge the sockets API.Neville-Neil, George V. et al. | 2009
- 56
-
The Claremont Report on Database ResearchAgrawal, Rakesh et al. | 2009
- 66
-
One Laptop Per Child: Vision vs. RealityKraemer, Kenneth L. et al. | 2009
- 74
-
How Computer Science Serves the Developing WorldDias, M.B. / Brewer, E. et al. | 2009
- 74
-
Review Articles - How Computer Science Serves the Developing WorldDias, M.Bernardine et al. | 2009
- 82
-
Reframing Security for the WebMyers, A. et al. | 2009
- 82
-
Research Highlights - Technical Perspective - Refraining Security for the WebMyers, Andrew et al. | 2009
- 83
-
Securing Frame Communication in BrowsersBarth, Adam et al. | 2009
- 92
-
Technical Perspective - Software and Hardware Support for Deterministic Replay of Parallel ProgramsJouppi, Norman P. et al. | 2009
- 92
-
Software and Hardware Support for Deterministic Replay of Parallel ProgramsJouppi, N.P. et al. | 2009
- 93
-
Two Hardware-based Approaches for Deterministic Multiprocessor ReplayHowe, Derek R. et al. | 2009
- 101
-
Careers| 2009
- 103
-
Last Byte - Puzzled - Solutions and SourcesWinkler, Peter et al. | 2009
- 103
-
Solutions and SourcesWinkler, P. et al. | 2009
- 104
-
Future Tense - Webmind Says HelloSawyer, Robert J. et al. | 2009
- 104
-
Webmind Says HelloSawyer, R.J. et al. | 2009