Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
The development processes of open source software are different from traditional closed source development processes. Still, open source software is frequently of high quality. Th...
—In this paper we extend a model-based approach to security management with concepts and methods that provide a possibility for quantitative assessments. For this purpose we intr...
Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Y...
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to new filtering techniques and the lack of incentive for mail domains to filter outg...
TCB Code Execution (Extended Abstract)∗ Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri Carnegie Mellon University We propose an architect...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...