Results 1 - 10
of
10,840
Abstract Aspectizing Security Concerns
"... Most aspects of computer security revolve around rules preventing an entity from performing an action outside of its permitted sphere of influence and inside that of another. The paper discusses a number of different security augmentation methods, such as dynamic wrappers, dataflow analysis based on ..."
Abstract
- Add to MetaCart
on extensions of type systems, and history-based access control. In general, security checks are crosscutting concerns and are hard to modularize. The paper describes how most of existing methods can be implemented in a more modular and evolutionfriendly fashion with the help of aspect-oriented techniques
QR Codes and Security Concerns
"... Abstract: It is important to differentiate between various objects and places in the real world. Any Smartphone equipped with a camera can read the content of QR code directly. QR codes being a two dimensional codes are useful in storing the information.This information isn’t present in human readab ..."
Abstract
- Add to MetaCart
Abstract: It is important to differentiate between various objects and places in the real world. Any Smartphone equipped with a camera can read the content of QR code directly. QR codes being a two dimensional codes are useful in storing the information.This information isn’t present in human readable form hence an individual cannot anticipate whether this is a valid information or a maliciously manipulated code. QR Codes can be used for attacking both the human interaction and the automated systems. While the humans may fall for various phishing attacks, the automated systems are vulnerable to command injections and SQL injection. This paper examines the QR codes different attacks. Though it is easy to modify the information stored in the QR code but one must make sure that the identifier written in the QR code is issued by an authorized organization.
Status of this Memo Teredo Security Concerns
, 2008
"... draft-ietf-v6ops-teredo-security-concerns-02 By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 o ..."
Abstract
- Add to MetaCart
draft-ietf-v6ops-teredo-security-concerns-02 By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6
SPINS: Security Protocols for Sensor Networks
, 2001
"... As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized ..."
Abstract
-
Cited by 1094 (30 self)
- Add to MetaCart
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized
Basic concepts and taxonomy of dependable and secure computing
- IEEE TDSC
, 2004
"... This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic defin ..."
Abstract
-
Cited by 779 (6 self)
- Add to MetaCart
This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic
A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract
-
Cited by 462 (7 self)
- Add to MetaCart
significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce therisk of a security breachby restricting the program's access to the operating system. In particular, we intercept and filter dangerous system calls
An aspect-based approach to modeling security concerns
- In Proceedings of the Workshop on Critical Systems Development with UML
, 2002
"... Abstract. In this paper we show how design-level aspects can be used to separate security concerns from essential functional concerns during software design. The aspect-oriented design technique described in this paper allows one to independently specify security and essential functional concerns, a ..."
Abstract
-
Cited by 28 (12 self)
- Add to MetaCart
Abstract. In this paper we show how design-level aspects can be used to separate security concerns from essential functional concerns during software design. The aspect-oriented design technique described in this paper allows one to independently specify security and essential functional concerns
Analysis of the X Protocol for Security Concerns
, 1996
"... This paper attempts to list all instances of certain types of security problems in the X Protocol. Issues with authorization are not addressed. We assume that a malicious client has already succeeded in connecting, and try to assess what harm it can then do. We propose modifications to the semantics ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper attempts to list all instances of certain types of security problems in the X Protocol. Issues with authorization are not addressed. We assume that a malicious client has already succeeded in connecting, and try to assess what harm it can then do. We propose modifications
Status of this Memo Security Concerns for IPng
, 1994
"... does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This document was submitted to the IETF IPng area in response to RFC 1550. Publication of this document does not imply acceptance by the IPng area of any ideas expressed within. Comments should be submitted to ..."
Abstract
- Add to MetaCart
outline a number of areas of concern. In some cases, there are features that would have a negative impact on security if nothing else is done. It may be desirable to adopt the features anyway, but in that case, the
Results 1 - 10
of
10,840