Sciweavers

42 search results - page 5 / 9
» PoX: Protecting users from malicious Facebook applications
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain fun...
Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuj...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
WWW
2009
ACM
14 years 8 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 7 months ago
Runtime monitoring for next generation Java ME platform
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...
ITRUST
2004
Springer
14 years 1 months ago
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities
This paper presents the design of a new middleware which provides support for trust and accountability in distributed data sharing communities. One application is in the context of...
Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Re...