Design of the {EROS} Trusted Window System
JS Shapiro, J Vanderburgh, E Northup… - 13th USENIX Security …, 2004 - usenix.org
Window systems are the primary mediator of user input and output in modern computing
systems. They are also a commonly used interprocess communication mechanism. As a …
systems. They are also a commonly used interprocess communication mechanism. As a …
Interface illusions
E Levy - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Phishing (the act of conning a person into divulging sensitive information) commonly uses
legitimate-looking Web sites that mimic the online interface of the institution the attacker is …
legitimate-looking Web sites that mimic the online interface of the institution the attacker is …
[PDF][PDF] Building a trusted path for applications using COTS components
H Langweg - Proc. NATO RTS IST Panel Symposium on Adaptive …, 2004 - sto.nato.int
Building a Trusted Path for Applications Using COTS Components Page 1 RTO-MP-IST-041
21 - 1 Building a Trusted Path for Applications Using COTS Components Hanno Langweg …
21 - 1 Building a Trusted Path for Applications Using COTS Components Hanno Langweg …
Secure visualization of authentication information: A case study
S Cannella, DJ Polivy, M Shin, C Straub… - … IEEE Symposium on …, 2004 - ieeexplore.ieee.org
The open nature of the Web makes it possible to create spoofed Web pages which, to the
casual observer, are indistinguishable from authentic pages. The defense against Web …
casual observer, are indistinguishable from authentic pages. The defense against Web …
[PDF][PDF] Expressing trust in distributed systems: the mismatch between tools and reality
SW Smith, C Masone, S Sinclair - Forty-Second Annual Allerton …, 2004 - cs.dartmouth.edu
Distributed systems typically support processes that involve humans separated by space
and by organizational boundaries. Because of its ability to enable secure communications …
and by organizational boundaries. Because of its ability to enable secure communications …
[图书][B] Firewalls und Sicherheit im Internet: Schutz vor cleveren Hackern
WR Cheswick - 2004 - books.google.com
Page 1 net.com networking & communications William R. Cheswick, Steven M. Bellovin, Aviel D.
Rubin O Firewalls und Sicherheit 2., aktualisierte Auflage Deutsche Übersetzung von Thomas …
Rubin O Firewalls und Sicherheit 2., aktualisierte Auflage Deutsche Übersetzung von Thomas …
Remotely Keyed CryptoGraphics-Secure Remote Display Access Using (Mostly) Untrusted Hardware-Extended Version
DL Cook, RA Baratto, AD Keromytis - 2004 - academiccommons.columbia.edu
Software that covertly monitors user actions, also known as spyware, has become a first-
level security threat due to its ubiquity and the difficulty of detecting and removing it. Such …
level security threat due to its ubiquity and the difficulty of detecting and removing it. Such …