Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Secure by default"'
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 8, Pp 77653-77665 (2020)
The number of cyberattacks has greatly increased in in the last years, as well as their sophistication and impact. For this reason, new emerging software development models are demanded, which help in developing secure by default software. To achieve
Publikováno v:
EuroS&P Workshops
Cross-site scripting (XSS) is a common security vulnerability found in web applications. DOM-based XSS, one of the variants, is becoming particularly more prevalent with the boom of single-page applications where most of the UI changes are achieved b
Publikováno v:
WF-IoT
The Industrial Internet of Things (IIoT) is a term applied to the industrial application of M2M devices. The security of IIoT devices is a difficult problem and where the automation of critical infrastructure is intended, risks may be unacceptable. R
Wireless networks have become an essential component of virtually every enterprise. The security technology for these networks (WPA2 Enterprise) has been designed for a world that is very different from today’s world. Basic assumptions for secure d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6adfc5bca4dc07ad4a1cf3a2e5227388
http://hdl.handle.net/11368/2943202
http://hdl.handle.net/11368/2943202
Autor:
Cherkaoui Leghris, Ali El Ksimi
Publikováno v:
Mobile, Secure, and Programmable Networking ISBN: 9783030031008
MSPN
MSPN
IPv6 is willing to be the most used protocol in the future Internet even its deployment takes more time due to some constraints. Indeed, IPv6 allows addressing all objects on the Internet with public addresses. One of the new associated IPv6 protocol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7c41aa792805176cd045e97fc3a9f25f
https://doi.org/10.1007/978-3-030-03101-5_6
https://doi.org/10.1007/978-3-030-03101-5_6
Publikováno v:
International Journal of Software Engineering and Knowledge Engineering. 26:769-805
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more
Autor:
Willard Rafnsson, Andrei Sabelfeld
Publikováno v:
CSF
Recently, much progress has been made on achieving information-flow security via secure multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by executing a given program multiple times, once for each security level, whi
Publikováno v:
Proceedings ICWS 2018: IEEE International Conference on Web Services
ICWS 2018: IEEE International Conference on Web Services
ICWS 2018: IEEE International Conference on Web Services, Jun 2018, Seattle, United States. pp.472-486, ⟨10.1007/978-3-319-94289-6_30⟩
Web Services – ICWS 2018 ISBN: 9783319942889
ICWS
ICWS 2018: IEEE International Conference on Web Services
ICWS 2018: IEEE International Conference on Web Services, Jun 2018, Seattle, United States. pp.472-486, ⟨10.1007/978-3-319-94289-6_30⟩
Web Services – ICWS 2018 ISBN: 9783319942889
ICWS
International audience; This paper presents a new methodology using software reflection to prevent, detect, and mitigate internal attacks to a running Internet Web server. This methodology is very suitable to design such systems as secure by default,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::449b6f6ff42313edf6a7b2a85e004c86
https://hal.archives-ouvertes.fr/hal-02017535
https://hal.archives-ouvertes.fr/hal-02017535
Autor:
Rui Jiang
Publikováno v:
International Journal on Smart Sensing and Intelligent Systems, Vol 6, Iss 4 (2013)
Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many security challenges, one of which is authentication. Lots of researches have been done in thi