Load Time Security Verification (Englisch)
- Neue Suche nach: Gadyatskaya, Olga
- Neue Suche nach: Lostal, Eduardo
- Neue Suche nach: Massacci, Fabio
- Neue Suche nach: Gadyatskaya, Olga
- Neue Suche nach: Lostal, Eduardo
- Neue Suche nach: Massacci, Fabio
In:
Information Systems Security
2
;
250-264
;
2011
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Load Time Security Verification
-
Beteiligte:
-
Erschienen in:Information Systems Security , 2 ; 250-264Lecture Notes in Computer Science ; 7093, 2 ; 250-264
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Understanding and Protecting Privacy: Formal Semantics and Principled Audit MechanismsDatta, Anupam / Blocki, Jeremiah / Christin, Nicolas / DeYoung, Henry / Garg, Deepak / Jia, Limin / Kaynar, Dilsun / Sinha, Arunesh et al. | 2011
- 28
-
Efficient Secure Computation with Garbled CircuitsHuang, Yan / Shen, Chih-hao / Evans, David / Katz, Jonathan / Shelat, Abhi et al. | 2011
- 49
-
Defending Users against Smartphone Apps: Techniques and Future DirectionsEnck, William et al. | 2011
- 71
-
Secure Composition of Cryptographic ProtocolsGoyal, Vipul et al. | 2011
- 72
-
Flow Based Interpretation of Access Control: Detection of Illegal Information FlowsJaume, Mathieu / Viet Triem Tong, Valérie / Mé, Ludovic et al. | 2011
- 87
-
Consistency Policies for Dynamic Information Systems with Declassification FlowsThomas, Julien A. / Cuppens, Frédéric / Cuppens-Boulahia, Nora et al. | 2011
- 102
-
Authorization Policy Specification and Enforcement for Group-Centric Secure Information SharingKrishnan, Ram / Sandhu, Ravi et al. | 2011
- 116
-
Abductive Analysis of Administrative Policies in Rule-Based Access ControlGupta, Puneet / Stoller, Scott D. / Xu, Zhongyuan et al. | 2011
- 131
-
Towards Detection of Botnet Communication through Social Media by Monitoring User ActivityBurghouwt, Pieter / Spruit, Marcel / Sips, Henk et al. | 2011
- 144
-
Finding Non-trivial Malware Naming InconsistenciesMaggi, Federico / Bellini, Andrea / Salvaneschi, Guido / Zanero, Stefano et al. | 2011
- 160
-
Taint-Enhanced Anomaly DetectionCavallaro, Lorenzo / Sekar, R. et al. | 2011
- 175
-
Secured Cloud Storage Scheme Using ECC Based Key Management in User HierarchyBasu, Atanu / Sengupta, Indranil / Sing, Jamuna Kanta et al. | 2011
- 190
-
Reversible Image Watermarking through Coordinate Logic Operation Based PredictionNaskar, Ruchira / Chakraborty, Rajat Subhra et al. | 2011
- 204
-
Some Combinatorial Results towards State Recovery Attack on RC4Das, Apurba / Maitra, Subhamoy / Paul, Goutam / Sarkar, Santanu et al. | 2011
- 215
-
Distributed Signcryption from PairingsGupta, Indivar / Saxena, P. K. et al. | 2011
- 235
-
Formal Privacy Analysis of Communication Protocols for Identity ManagementVeeningen, Meilof / Weger, Benne / Zannone, Nicola et al. | 2011
- 250
-
Load Time Security VerificationGadyatskaya, Olga / Lostal, Eduardo / Massacci, Fabio et al. | 2011
- 265
-
Preserving Location Privacy for Continuous Queries on Known RouteSaxena, Anuj S. / Pundir, Mayank / Goyal, Vikram / Bera, Debajyoti et al. | 2011
- 280
-
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing AttacksAhmed, Faraz / Rafique, M. Zubair / Abulaish, Muhammad et al. | 2011
- 294
-
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor NetworksBanerjee, Prithu / Mitra, Mahasweta / Barbhuiya, Ferdous A. / Chakraborty, Sandip / Nandi, Sukumar et al. | 2011
- 309
-
SecWEM: A Security Solution for Web Based E-mailYadav, Ravi Shankar / Likhar, Praveen / Rao, M. Keshava et al. | 2011
- 322
-
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoSGeneiatakis, Dimitris / Portokalidis, Georgios / Keromytis, Angelos D. et al. | 2011
- 337
-
Mitigation of Malicious Modifications by Insiders in DatabasesRagavan, Harini / Panda, Brajendra et al. | 2011
- 352
-
A Semantic Hierarchy for Erasure PoliciesTedesco, Filippo / Hunt, Sebastian / Sands, David et al. | 2011
- 370
-
A Universal Semantic Bridge for Virtual Machine IntrospectionSchneider, Christian / Pfoh, Jonas / Eckert, Claudia et al. | 2011
- 374
-
A Signature-Based Approach of Correctness Assurance in Data Outsourcing ScenariosNoferesti, Morteza / Hadavi, Mohammad Ali / Jalili, Rasool et al. | 2011
- 379
-
Towards Access Control Model EngineeringKühnhauser, Winfried E. / Pölck, Anja et al. | 2011
- 383
-
IFrandbox - Client Side Protection from Malicious Injected IframesNadkarni, Tanusha S. / Mohandas, Radhesh / Pais, Alwyn R. et al. | 2011