117
click to vote
ESORICS
15 years 20 days ago
2006 Springer
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
88
Voted
ESORICS
15 years 20 days ago
2006 Springer
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
90
Voted
ESORICS
15 years 20 days ago
2006 Springer
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
ESORICS
15 years 20 days ago
2006 Springer
Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
ESORICS
15 years 20 days ago
2006 Springer
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
|