Results 1 - 10
of
351
Unauthorized origin crossing on mobile platforms: Threats and mitigation.
- In CCS,
, 2013
"... ABSTRACT With the progress in mobile computing, web services are increasingly delivered to their users through mobile apps, instead of web browsers. However, unlike the browser, which enforces origin-based security policies to mediate the interactions between the web content from different sources, ..."
Abstract
-
Cited by 15 (2 self)
- Add to MetaCart
-site scripting and request forgery, an unauthorized party can obtain a mobile user's Facebook/Dropbox authentication credentials and record her text input. We report our findings to related software vendors, who all acknowledged their importance. To address this threat, we designed an origin
Officers
"... Has an unauthorized party gained access to our data? Loss of trade secrets Loss of strategic or tactical advantage Loss of privacy Loss of privilege (e.g., defamation) Damage to people and property Has an unauthorized party surreptitiously changed our data? Implications for Corporate ..."
Abstract
- Add to MetaCart
Has an unauthorized party gained access to our data? Loss of trade secrets Loss of strategic or tactical advantage Loss of privacy Loss of privilege (e.g., defamation) Damage to people and property Has an unauthorized party surreptitiously changed our data? Implications for Corporate
Building an Encrypted and Searchable Audit Log
- In The 11th Annual Network and Distributed System Security Symposium
, 2004
"... Audit logs are an important part of any secure system, and they need to be carefully designed in order to give a faithful representation of past system activity. This is especially true in the presence of adversaries who might want to tamper with the audit logs. While it is important that auditors c ..."
Abstract
-
Cited by 99 (2 self)
- Add to MetaCart
can inspect audit logs to assess past system activity, the content of an audit log may contain sensitive information, and should therefore be protected from unauthorized parties.
Disallowing Unauthorized State Changes Of Distributed Shared Objects
- In SEC
, 2000
"... Attaching digital signatures to state update messages in global distributed shared object (DSO) systems is not trivial. If the DSO consists of a number of autonomous local representative that use open, public networks for maintaining the state consistency, allowing a local representative to sign sta ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
state update messages is not appropriate. More sophisticated schemes are required to prevent unauthorized state updates by malicious local representative or external parties. This paper examines the problem in detail, compares a number of possible solutions, and identies the most suitable one
Analysis of an Electronic Voting System
, 2003
"... Recent election problems have sparked great interest in managing the election process through the use of electronic voting systems. While computer scientists, for the most part, have been warning of the perils of such action, vendors have forged ahead with their products, claiming increased security ..."
Abstract
-
Cited by 186 (16 self)
- Add to MetaCart
security and reliability. Many municipalities have adopted electronic systems, and the number of deployed systems is rising. For these new computerized voting systems, neither source code nor the results of any third-party certification analyses have been available for the general population to study
Cryptosystems that Secure Web Browsers
"... The need to secure Web browsers from eavesdropping of unauthorized parties or stealing of data pushed the development of cryptosystems that work to secure Web browsers. This was of particular importance for users trust of any Web based business such as electronic commerce ..."
Abstract
- Add to MetaCart
The need to secure Web browsers from eavesdropping of unauthorized parties or stealing of data pushed the development of cryptosystems that work to secure Web browsers. This was of particular importance for users trust of any Web based business such as electronic commerce
Information Security- Key Management
"... The way in which modern distributed computing systems operate makes it very difficult to limit the access to sensitive data. Insecure data broadcasting in computer networks, development of remote login facilities and distributed file systems create new opportunities for unauthorized parties to acces ..."
Abstract
- Add to MetaCart
The way in which modern distributed computing systems operate makes it very difficult to limit the access to sensitive data. Insecure data broadcasting in computer networks, development of remote login facilities and distributed file systems create new opportunities for unauthorized parties
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data of Patients
"... Abstract: Healthcare professionals typically use their computer systems not only for accessing patient health records, but also to connect to medical accounting and billing services as well as other services on the Internet. This raises security and privacy concerns as client platforms may be infect ..."
Abstract
- Add to MetaCart
be infected by malware and could manipulate data or leak data to unauthorized parties. The project MediTrust aims to protect medical data of patients from being leaked to unauthorized parties. We propose a security infrastructure that builds privacy protection domains and enforces them up to the end
Disclosure Limitation of Sensitive Rules
, 1999
"... Data products (macrodata or tabular data and microdata or raw data records), are designed to inform public or business policy, and research or public information. Securing these products against unauthorized accesses has been a long-term goal of the database security research community and the gover ..."
Abstract
-
Cited by 112 (9 self)
- Add to MetaCart
Data products (macrodata or tabular data and microdata or raw data records), are designed to inform public or business policy, and research or public information. Securing these products against unauthorized accesses has been a long-term goal of the database security research community
unknown title
"... AES algorithm Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel. It protects against unauthorized parties by preventing unauthorized alteration of use. Generally speaking, it uses a cryptographic system to transform a plaintext int ..."
Abstract
- Add to MetaCart
AES algorithm Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel. It protects against unauthorized parties by preventing unauthorized alteration of use. Generally speaking, it uses a cryptographic system to transform a plaintext
Results 1 - 10
of
351