Sciweavers

JCS
2010
104views more  JCS 2010»
13 years 10 months ago
Static analysis for detecting taint-style vulnerabilities in web applications
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
JCS
2010
67views more  JCS 2010»
13 years 10 months ago
Assurance for federated identity management
Adrian Baldwin, Marco Casassa Mont, Yolanta Beres,...
JCS
2010
104views more  JCS 2010»
13 years 10 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JCS
2010
122views more  JCS 2010»
13 years 10 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
JCS
2010
135views more  JCS 2010»
13 years 10 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...