Sciweavers

SEC
2004
14 years 1 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
SEC
2004
14 years 1 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
SEC
2004
14 years 1 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
SEC
2004
14 years 1 months ago
Recursive Sandboxes: Extending Systrace To Empower Applications
The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We desc...
Aleksey Kurchuk, Angelos D. Keromytis
SEC
2004
14 years 1 months ago
Interactive Access Control for Web Services
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...
Hristo Koshutanski, Fabio Massacci
SEC
2004
14 years 1 months ago
An Abstract Reduction Model for Computer Security Risk
Mohamed Hamdi, Noureddine Boudriga
SEC
2004
14 years 1 months ago
Spam Filter Analysis
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, hav...
Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Ni...
SEC
2004
14 years 1 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi