Sciweavers

434 search results - page 47 / 87
» Security Documentation
Sort
View
FORTE
2004
13 years 9 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ODRL
2004
13 years 9 months ago
Nonius: Implementing a DRM Extension to an XML Browser
The paper describes experiences, ideas, and problems that were discovered while developing a digital rights management (DRM) extension to an XML browser. The supported rights desc...
Olli Pitkänen, Ville Saarinen, Jari Anttila, ...
WWW
2005
ACM
14 years 8 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...
ISI
2007
Springer
14 years 1 months ago
FACT: Fast Algorithm for Categorizing Text
— With the ever-increasing number of digital documents, the ability to automatically classifying those documents both quickly and accurately is becoming more critical and difficu...
Saket S. R. Mengle, Nazli Goharian, Alana Platt