Sciweavers

1943 search results - page 153 / 389
» Web application security engineering
Sort
View
EUROSYS
2006
ACM
16 years 3 days ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
WWW
2004
ACM
16 years 3 months ago
The effect of the back button in a random walk: application for pagerank
Theoretical analysis of the Web graph is often used to improve the efficiency of search engines. The PageRank algorithm, proposed by [5], is used by the Google search engine [4] t...
Fabien Mathieu, Mohamed Bouklit
ISSRE
2010
IEEE
15 years 1 months ago
Security Trend Analysis with CVE Topic Models
—We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability typ...
Stephan Neuhaus, Thomas Zimmermann
CIKM
2004
Springer
15 years 8 months ago
Optimizing web search using web click-through data
The performance of web search engines may often deteriorate due to the diversity and noisy information contained within web pages. User click-through data can be used to introduce...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Yong Yu, W...
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
15 years 9 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...