In this paper, we present the design and prototype of a new approach to cookie management: if a server deposits a cookie only after authenticating itself via the SSL handshake, the...
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should tak...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...