Sciweavers

2281 search results - page 97 / 457
» Security Patterns and Secure Systems Design
Sort
View
ESORICS
2010
Springer
15 years 1 months ago
Enforcing Secure Object Initialization in Java
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not followin...
Laurent Hubert, Thomas P. Jensen, Vincent Monfort,...
91
Voted
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 6 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
95
Voted
COMPSEC
2006
141views more  COMPSEC 2006»
15 years 15 days ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
JSW
2008
122views more  JSW 2008»
15 years 13 days ago
Security of Distributed Digital Criminal Dossiers
Abstract-- Securely managing shared information in distributed environments across multiple organisations is a challenge. Distributed information management systems must be able to...
Martijn Warnier, Frances M. T. Brazier, Anja Oskam...
CHI
2007
ACM
16 years 26 days ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...