Sciweavers

3420 search results - page 203 / 684
» A Language-Based Approach to Security
Sort
View
147
Voted
JCS
2010
135views more  JCS 2010»
15 years 3 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
SACMAT
2011
ACM
14 years 7 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
EAGC
2003
Springer
15 years 9 months ago
Automatic Services Discovery, Monitoring and Visualization of Grid Environments: The MapCenter Approach
The complexity of Grid environments is growing as more projects and applications appear in this quick-evolving domain. Widespread applications are distributed over thousands of com...
Franck Bonnassieux, Robert Harakaly, Pascale Prime...
IJSSE
2010
80views more  IJSSE 2010»
15 years 1 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
ESORICS
2007
Springer
15 years 10 months ago
Towards Modeling Trust Based Decisions: A Game Theoretic Approach
Current trust models enable decision support at an implicit level by means of thresholds or constraint satisfiability. Decision support is mostly included only for a single binary...
Vidyaraman Sankaranarayanan, Madhusudhanan Chandra...