We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not ran...
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...