Sciweavers

15379 search results - page 46 / 3076
» Protecting users from
Sort
View
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
CEC
2003
IEEE
13 years 11 months ago
Increasing the accuracy of a spam-detecting artificial immune system
AbstractSpam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the se...
Terri Oda, Tony White
WPES
2005
ACM
14 years 1 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 7 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer