Sciweavers

1757 search results - page 3 / 352
» Secure Content Validation
Sort
View
ESORICS
2008
Springer
15 years 2 months ago
Exploring User Reactions to New Browser Cues for Extended Validation Certificates
Jennifer Sobey, Robert Biddle, Paul C. van Oorscho...
159
Voted
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 4 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
107
Voted
CN
2007
99views more  CN 2007»
15 years 12 days ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
105
Voted
JALC
2006
125views more  JALC 2006»
15 years 11 days ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
94
Voted
CSIE
2009
IEEE
15 years 7 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev