Sciweavers

211 search results - page 30 / 43
» Securing UML Information Flow Using FlowUML
Sort
View
76
Voted
WWW
2010
ACM
15 years 3 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
TISSEC
2010
142views more  TISSEC 2010»
14 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
EUROPKI
2009
Springer
14 years 7 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
76
Voted
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 2 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
77
Voted
MOBIHOC
2003
ACM
15 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong