Sciweavers

4731 search results - page 89 / 947
» Securing Interactive Programs
Sort
View
CP
2007
Springer
14 years 3 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
ACSAC
1999
IEEE
14 years 1 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
ACSAC
2003
IEEE
14 years 2 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
INTERACT
2003
13 years 10 months ago
Programming in the Kitchen
: In this paper we discuss issues for the integration of computing power in mundane artefacts. We do so with reference to a recent project with a manufacturer of ovens for larger k...
Olav W. Bertelsen, Toke Eskildsen, Werner Sperschn...
CN
1999
91views more  CN 1999»
13 years 8 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...