Sciweavers

647 search results - page 105 / 130
» Electronic Commerce: An Overview
Sort
View
CCS
2010
ACM
14 years 8 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
IFIPTM
2010
145views Management» more  IFIPTM 2010»
14 years 8 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
SIGSOFT
2010
ACM
14 years 7 months ago
Software economies
Software construction has typically drawn on engineering metaphors like building bridges or cathedrals, which emphasize architecture, specification, central planning, and determin...
David F. Bacon, Eric Bokelberg, Yiling Chen, Ian A...

Lecture Notes
404views
16 years 8 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
ISCAS
2008
IEEE
101views Hardware» more  ISCAS 2008»
15 years 4 months ago
Digitally enhanced analog circuits: System aspects
— An overview of digital enhancement techniques for analog circuits is presented. Recent research suggests that the high density and low energy of digital circuits can be leverag...
Boris Murmann, Christian Vogel, Heinz Koeppl