Sciweavers

3003 search results - page 545 / 601
» Software Security: Building Security In
Sort
View
DISCEX
2003
IEEE
14 years 2 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 2 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
WMCSA
2003
IEEE
14 years 2 months ago
Web Services on Mobile Devices - Implementation and Experience
Web Services have started to appear on servers as interfaces between business-to-business applications. To date, mobile devices have only consumed Web Services running on stationa...
Stefan Berger, Scott McFaddin, Chandrasekhar Naray...
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
PLDI
2010
ACM
14 years 1 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...