Sciweavers

2213 search results - page 165 / 443
» Software Security
Sort
View
127
Voted
ARCS
2006
Springer
15 years 7 months ago
Safety, Liveness, and Information Flow: Dependability Revisited
Abstract: We present a formal framework to talk and reason about dependable systems. The framework is based on three distinct classes of (system specification) properties we call s...
Zinaida Benenson, Felix C. Freiling, Thorsten Holz...
CCS
2009
ACM
16 years 4 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
121
Voted
FC
2004
Springer
88views Cryptology» more  FC 2004»
15 years 9 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
116
Voted
CORR
2010
Springer
352views Education» more  CORR 2010»
15 years 3 months ago
Case Study On Social Engineering Techniques for Persuasion
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working prin...
Mosin Hasan, Nilesh Prajapati, Safvan Vohara
ACSAC
2007
IEEE
15 years 10 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel