Load Time Security Verification (English)
- New search for: Gadyatskaya, Olga
- New search for: Lostal, Eduardo
- New search for: Massacci, Fabio
- New search for: Gadyatskaya, Olga
- New search for: Lostal, Eduardo
- New search for: Massacci, Fabio
In:
ICISS, International Conference on Information Systems Security, 7
;
250-264
;
2011
-
ISSN:
- Conference paper / Print
-
Title:Load Time Security Verification
-
Contributors:
-
Published in:Lecture Notes in Computer Science ; 7093 ; 250-264
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011
-
Size:15 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Understanding and Protecting Privacy: Formal Semantics and Principled Audit MechanismsDatta, A. / Blocki, J. / Christin, N. / DeYoung, H. / Garg, D. / Jia, L. / Kaynar, D. / Sinha, A. et al. | 2011
- 28
-
Efficient Secure Computation with Garbled CircuitsHuang, Y. / Shen, C.-h. / Evans, D. / Katz, J. / Shelat, A. et al. | 2011
- 49
-
Defending Users against Smartphone Apps: Techniques and Future DirectionsEnck, W. et al. | 2011
- 71
-
Secure Composition of Cryptographic ProtocolsGoyal, V. et al. | 2011
- 72
-
Flow Based Interpretation of Access Control: Detection of Illegal Information FlowsJaume, M. / Tong, V.V.T. / Me, L. et al. | 2011
- 87
-
Consistency Policies for Dynamic Information Systems with Declassification FlowsThomas, J.A. / Cuppens, F. / Cuppens-Boulahia, N. et al. | 2011
- 102
-
Authorization Policy Specification and Enforcement for Group-Centric Secure Information SharingKrishnan, R. / Sandhu, R. et al. | 2011
- 116
-
Abductive Analysis of Administrative Policies in Rule-Based Access ControlGupta, P. / Stoller, S.D. / Xu, Z. et al. | 2011
- 131
-
Towards Detection of Botnet Communication through Social Media by Monitoring User ActivityBurghouwt, P. / Spruit, M. / Sips, H. et al. | 2011
- 144
-
Finding Non-trivial Malware Naming InconsistenciesMaggi, F. / Bellini, A. / Salvaneschi, G. / Zanero, S. et al. | 2011
- 160
-
Taint-Enhanced Anomaly DetectionCavallaro, L. / Sekar, R. et al. | 2011
- 175
-
Secured Cloud Storage Scheme Using ECC Based Key Management in User HierarchyBasu, A. / Sengupta, I. / Sing, J.K. et al. | 2011
- 190
-
Reversible Image Watermarking through Coordinate Logic Operation Based PredictionNaskar, R. / Chakraborty, R.S. et al. | 2011
- 204
-
Some Combinatorial Results towards State Recovery Attack on RC4Das, A. / Maitra, S. / Paul, G. / Sarkar, S. et al. | 2011
- 215
-
Distributed Signcryption from PairingsGupta, I. / Saxena, P.K. et al. | 2011
- 235
-
Formal Privacy Analysis of Communication Protocols for Identity ManagementVeeningen, M. / de Weger, B. / Zannone, N. et al. | 2011
- 250
-
Load Time Security VerificationGadyatskaya, O. / Lostal, E. / Massacci, F. et al. | 2011
- 265
-
Preserving Location Privacy for Continuous Queries on Known RouteSaxena, A.S. / Pundir, M. / Goyal, V. / Bera, D. et al. | 2011
- 280
-
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing AttacksAhmed, F. / Rafique, M.Z. / Abulaish, M. et al. | 2011
- 294
-
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor NetworksBanerjee, P. / Mitra, M. / Barbhuiya, F.A. / Chakraborty, S. / Nandi, S. et al. | 2011
- 309
-
SecWEM: A Security Solution for Web Based E-mailYadav, R.S. / Likhar, P. / Rao, M.K. et al. | 2011
- 322
-
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoSGeneiatakis, D. / Portokalidis, G. / Keromytis, A.D. et al. | 2011
- 337
-
Mitigation of Malicious Modifications by Insiders in DatabasesRagavan, H. / Panda, B. et al. | 2011
- 352
-
A Semantic Hierarchy for Erasure PoliciesDel Tedesco, F. / Hunt, S. / Sands, D. et al. | 2011
- 370
-
A Universal Semantic Bridge for Virtual Machine IntrospectionSchneider, C. / Pfoh, J. / Eckert, C. et al. | 2011
- 374
-
A Signature-Based Approach of Correctness Assurance in Data Outsourcing ScenariosNoferesti, M. / Hadavi, M.A. / Jalili, R. et al. | 2011
- 379
-
Towards Access Control Model EngineeringKuhnhauser, W.E. / Polck, A. et al. | 2011
- 383
-
IFrandbox - Client Side Protection from Malicious Injected IframesNadkarni, T.S. / Mohandas, R. / Pais, A.R. et al. | 2011