Load Time Security Verification (Englisch)
- Neue Suche nach: Gadyatskaya, Olga
- Neue Suche nach: Lostal, Eduardo
- Neue Suche nach: Massacci, Fabio
- Neue Suche nach: Gadyatskaya, Olga
- Neue Suche nach: Lostal, Eduardo
- Neue Suche nach: Massacci, Fabio
In:
ICISS, International Conference on Information Systems Security, 7
;
250-264
;
2011
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Load Time Security Verification
-
Beteiligte:
-
Erschienen in:Lecture Notes in Computer Science ; 7093 ; 250-264
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2011
-
Format / Umfang:15 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Understanding and Protecting Privacy: Formal Semantics and Principled Audit MechanismsDatta, A. / Blocki, J. / Christin, N. / DeYoung, H. / Garg, D. / Jia, L. / Kaynar, D. / Sinha, A. et al. | 2011
- 28
-
Efficient Secure Computation with Garbled CircuitsHuang, Y. / Shen, C.-h. / Evans, D. / Katz, J. / Shelat, A. et al. | 2011
- 49
-
Defending Users against Smartphone Apps: Techniques and Future DirectionsEnck, W. et al. | 2011
- 71
-
Secure Composition of Cryptographic ProtocolsGoyal, V. et al. | 2011
- 72
-
Flow Based Interpretation of Access Control: Detection of Illegal Information FlowsJaume, M. / Tong, V.V.T. / Me, L. et al. | 2011
- 87
-
Consistency Policies for Dynamic Information Systems with Declassification FlowsThomas, J.A. / Cuppens, F. / Cuppens-Boulahia, N. et al. | 2011
- 102
-
Authorization Policy Specification and Enforcement for Group-Centric Secure Information SharingKrishnan, R. / Sandhu, R. et al. | 2011
- 116
-
Abductive Analysis of Administrative Policies in Rule-Based Access ControlGupta, P. / Stoller, S.D. / Xu, Z. et al. | 2011
- 131
-
Towards Detection of Botnet Communication through Social Media by Monitoring User ActivityBurghouwt, P. / Spruit, M. / Sips, H. et al. | 2011
- 144
-
Finding Non-trivial Malware Naming InconsistenciesMaggi, F. / Bellini, A. / Salvaneschi, G. / Zanero, S. et al. | 2011
- 160
-
Taint-Enhanced Anomaly DetectionCavallaro, L. / Sekar, R. et al. | 2011
- 175
-
Secured Cloud Storage Scheme Using ECC Based Key Management in User HierarchyBasu, A. / Sengupta, I. / Sing, J.K. et al. | 2011
- 190
-
Reversible Image Watermarking through Coordinate Logic Operation Based PredictionNaskar, R. / Chakraborty, R.S. et al. | 2011
- 204
-
Some Combinatorial Results towards State Recovery Attack on RC4Das, A. / Maitra, S. / Paul, G. / Sarkar, S. et al. | 2011
- 215
-
Distributed Signcryption from PairingsGupta, I. / Saxena, P.K. et al. | 2011
- 235
-
Formal Privacy Analysis of Communication Protocols for Identity ManagementVeeningen, M. / de Weger, B. / Zannone, N. et al. | 2011
- 250
-
Load Time Security VerificationGadyatskaya, O. / Lostal, E. / Massacci, F. et al. | 2011
- 265
-
Preserving Location Privacy for Continuous Queries on Known RouteSaxena, A.S. / Pundir, M. / Goyal, V. / Bera, D. et al. | 2011
- 280
-
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing AttacksAhmed, F. / Rafique, M.Z. / Abulaish, M. et al. | 2011
- 294
-
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor NetworksBanerjee, P. / Mitra, M. / Barbhuiya, F.A. / Chakraborty, S. / Nandi, S. et al. | 2011
- 309
-
SecWEM: A Security Solution for Web Based E-mailYadav, R.S. / Likhar, P. / Rao, M.K. et al. | 2011
- 322
-
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoSGeneiatakis, D. / Portokalidis, G. / Keromytis, A.D. et al. | 2011
- 337
-
Mitigation of Malicious Modifications by Insiders in DatabasesRagavan, H. / Panda, B. et al. | 2011
- 352
-
A Semantic Hierarchy for Erasure PoliciesDel Tedesco, F. / Hunt, S. / Sands, D. et al. | 2011
- 370
-
A Universal Semantic Bridge for Virtual Machine IntrospectionSchneider, C. / Pfoh, J. / Eckert, C. et al. | 2011
- 374
-
A Signature-Based Approach of Correctness Assurance in Data Outsourcing ScenariosNoferesti, M. / Hadavi, M.A. / Jalili, R. et al. | 2011
- 379
-
Towards Access Control Model EngineeringKuhnhauser, W.E. / Polck, A. et al. | 2011
- 383
-
IFrandbox - Client Side Protection from Malicious Injected IframesNadkarni, T.S. / Mohandas, R. / Pais, A.R. et al. | 2011