163
click to vote
ESORICS
15 years 6 months ago
2006 Springer
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
137
Voted
ESORICS
15 years 6 months ago
2006 Springer
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
132
Voted
ESORICS
15 years 6 months ago
2006 Springer
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
117
click to vote
ESORICS
15 years 6 months ago
2006 Springer
Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
125
click to vote
ESORICS
15 years 6 months ago
2006 Springer
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
|