Protection Tiers and Their Applications for Evaluating Untrusted Code on A Linux-Based Web Server.
Zhuhan JiangJiansheng HuangRezina AkhterPublished in: J. Commun. (2015)
Keyphrases
- web server
- linux kernel
- file system
- website
- protection scheme
- operating system
- database server
- web pages
- open source
- source code
- end users
- web search engines
- windows nt
- web usage mining
- web browser
- web logs
- third party
- log files
- database applications
- web server logs
- web crawlers
- information retrieval
- reed solomon codes
- privacy protection
- security policies
- web users
- mobile agents
- privacy preserving
- expert systems
- dynamic content
- artificial intelligence