Sciweavers

70 search results - page 11 / 14
» How Security Problems can Compromise Remote Internet Voting ...
Sort
View
ESORICS
2012
Springer
11 years 10 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
SOUPS
2010
ACM
13 years 11 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
SACMAT
2009
ACM
14 years 2 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
WWW
2002
ACM
14 years 8 months ago
A graphical user interface toolkit approach to thin-client computing
Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a ...
Simon Lok, Steven Feiner, William M. Chiong, Yoav ...
WORDS
2005
IEEE
14 years 1 months ago
Enhancing DNS Security using the SSL Trust Infrastructure
The main functionality of the Domain Name System (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, ...
Christof Fetzer, Gert Pfeifer, Trevor Jim