Sciweavers

1186 search results - page 82 / 238
» A New Approach to Secure Logging
Sort
View
113
Voted
CCS
2011
ACM
14 years 17 days ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
89
Voted
CRIWG
2006
15 years 2 months ago
Social Visualization Encouraging Participation in Online Communities
The paper describes a further development of the design of a motivational visualization encouraging participation in an online community. The new design overcomes shortcomings in p...
Lingling Sun, Julita Vassileva
107
Voted
CSFW
2007
IEEE
15 years 7 months ago
Privacy and Utility in Business Processes
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
Adam Barth, John C. Mitchell, Anupam Datta, Sharad...
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
94
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...