Sciweavers

JCS
2010
104views more  JCS 2010»
13 years 3 months ago
Static analysis for detecting taint-style vulnerabilities in web applications
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
JCS
2010
67views more  JCS 2010»
13 years 3 months ago
Assurance for federated identity management
Adrian Baldwin, Marco Casassa Mont, Yolanta Beres,...
JCS
2010
104views more  JCS 2010»
13 years 3 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JCS
2010
122views more  JCS 2010»
13 years 3 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
JCS
2010
135views more  JCS 2010»
13 years 3 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...