• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 351
Next 10 →

Unauthorized origin crossing on mobile platforms: Threats and mitigation.

by Rui Wang , Luyi Xing , Xiaofeng Wang , Shuo Chen - In CCS, , 2013
"... ABSTRACT With the progress in mobile computing, web services are increasingly delivered to their users through mobile apps, instead of web browsers. However, unlike the browser, which enforces origin-based security policies to mediate the interactions between the web content from different sources, ..."
Abstract - Cited by 15 (2 self) - Add to MetaCart
-site scripting and request forgery, an unauthorized party can obtain a mobile user's Facebook/Dropbox authentication credentials and record her text input. We report our findings to related software vendors, who all acknowledged their importance. To address this threat, we designed an origin

Officers

by Richard D. Marks, Davis Wright Tremaine, Copyright Richard, D. Marks
"... Has an unauthorized party gained access to our data? Loss of trade secrets Loss of strategic or tactical advantage Loss of privacy Loss of privilege (e.g., defamation) Damage to people and property Has an unauthorized party surreptitiously changed our data? Implications for Corporate ..."
Abstract - Add to MetaCart
Has an unauthorized party gained access to our data? Loss of trade secrets Loss of strategic or tactical advantage Loss of privacy Loss of privilege (e.g., defamation) Damage to people and property Has an unauthorized party surreptitiously changed our data? Implications for Corporate

Building an Encrypted and Searchable Audit Log

by Brent Waters, Brent R. Waters, Dirk Balfanz, Dirk Balfanz, Glenn Durfee, Glenn Durfee, D. K. Smetters, D. K. Smetters - In The 11th Annual Network and Distributed System Security Symposium , 2004
"... Audit logs are an important part of any secure system, and they need to be carefully designed in order to give a faithful representation of past system activity. This is especially true in the presence of adversaries who might want to tamper with the audit logs. While it is important that auditors c ..."
Abstract - Cited by 99 (2 self) - Add to MetaCart
can inspect audit logs to assess past system activity, the content of an audit log may contain sensitive information, and should therefore be protected from unauthorized parties.

Disallowing Unauthorized State Changes Of Distributed Shared Objects

by J. Leiwo, C. Hänle, P. Homburg, A. S. Tanenbaum - In SEC , 2000
"... Attaching digital signatures to state update messages in global distributed shared object (DSO) systems is not trivial. If the DSO consists of a number of autonomous local representative that use open, public networks for maintaining the state consistency, allowing a local representative to sign sta ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
state update messages is not appropriate. More sophisticated schemes are required to prevent unauthorized state updates by malicious local representative or external parties. This paper examines the problem in detail, compares a number of possible solutions, and identies the most suitable one

Analysis of an Electronic Voting System

by Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach , 2003
"... Recent election problems have sparked great interest in managing the election process through the use of electronic voting systems. While computer scientists, for the most part, have been warning of the perils of such action, vendors have forged ahead with their products, claiming increased security ..."
Abstract - Cited by 186 (16 self) - Add to MetaCart
security and reliability. Many municipalities have adopted electronic systems, and the number of deployed systems is rising. For these new computerized voting systems, neither source code nor the results of any third-party certification analyses have been available for the general population to study

Cryptosystems that Secure Web Browsers

by E. Craig Luther
"... The need to secure Web browsers from eavesdropping of unauthorized parties or stealing of data pushed the development of cryptosystems that work to secure Web browsers. This was of particular importance for users trust of any Web based business such as electronic commerce ..."
Abstract - Add to MetaCart
The need to secure Web browsers from eavesdropping of unauthorized parties or stealing of data pushed the development of cryptosystems that work to secure Web browsers. This was of particular importance for users trust of any Web based business such as electronic commerce

Information Security- Key Management

by Miroslav Bakalov (cs, Fotis Telloglou (cs, Nikola Minic ́ (cs
"... The way in which modern distributed computing systems operate makes it very difficult to limit the access to sensitive data. Insecure data broadcasting in computer networks, development of remote login facilities and distributed file systems create new opportunities for unauthorized parties to acces ..."
Abstract - Add to MetaCart
The way in which modern distributed computing systems operate makes it very difficult to limit the access to sensitive data. Insecure data broadcasting in computer networks, development of remote login facilities and distributed file systems create new opportunities for unauthorized parties

MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data of Patients

by Ammar Alkassar, Biljana Cubaleska, Hans Löhr, Ahmad-reza Sadeghi, Christian Stüble, Marcel Win
"... Abstract: Healthcare professionals typically use their computer systems not only for accessing patient health records, but also to connect to medical accounting and billing services as well as other services on the Internet. This raises security and privacy concerns as client platforms may be infect ..."
Abstract - Add to MetaCart
be infected by malware and could manipulate data or leak data to unauthorized parties. The project MediTrust aims to protect medical data of patients from being leaked to unauthorized parties. We propose a security infrastructure that builds privacy protection domains and enforces them up to the end

Disclosure Limitation of Sensitive Rules

by M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, V. Verykios , 1999
"... Data products (macrodata or tabular data and microdata or raw data records), are designed to inform public or business policy, and research or public information. Securing these products against unauthorized accesses has been a long-term goal of the database security research community and the gover ..."
Abstract - Cited by 112 (9 self) - Add to MetaCart
Data products (macrodata or tabular data and microdata or raw data records), are designed to inform public or business policy, and research or public information. Securing these products against unauthorized accesses has been a long-term goal of the database security research community

unknown title

by unknown authors
"... AES algorithm Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel. It protects against unauthorized parties by preventing unauthorized alteration of use. Generally speaking, it uses a cryptographic system to transform a plaintext int ..."
Abstract - Add to MetaCart
AES algorithm Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel. It protects against unauthorized parties by preventing unauthorized alteration of use. Generally speaking, it uses a cryptographic system to transform a plaintext
Next 10 →
Results 1 - 10 of 351
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University