Sciweavers

2517 search results - page 240 / 504
» Secure Deployment of Components
Sort
View
112
Voted
COMPSAC
2002
IEEE
15 years 7 months ago
Constructing an EJB Application in a WFMS
A workflow system provides enterprises the automatic and paperless process management. The idea of Enterprise JavaBeans (EJB) is to utilize components from various vendors to cons...
Jian-Wei Wang, Ta-Chun Lin, Hwai-Jong Hsu, Feng-Ji...
EUROSEC
2009
ACM
15 years 9 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...
137
Voted
CCS
2005
ACM
15 years 8 months ago
Exploiting open functionality in SMS-capable cellular networks
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text mes...
William Enck, Patrick Traynor, Patrick McDaniel, T...
120
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
129
Voted
IACR
2011
129views more  IACR 2011»
14 years 2 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter