-
1
-
-
71749105371
-
Assessing the security risks of cloud computing
-
[Online]. Available
-
J. Heiser and M. Nicolett, "Assessing the security risks of cloud computing, " Gartner Report, 2009. [Online]. Available: http://www.gartner.com/DisplayDocument?id=685308.
-
(2009)
Gartner Report
-
-
Heiser, J.1
Nicolett, M.2
-
2
-
-
70450184286
-
The Transport Layer Security (TLS) protocol version 1.2
-
2008
-
T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2, " IETF RFC 5246, 2008, http://www.ietf.org/rfc/ rfc5246.txt.
-
IETF RFC 5246
-
-
Dierks, T.1
Rescorla, E.2
-
3
-
-
33745816410
-
Why phishing works
-
ACM
-
R. Dhamija, J. D. Tygar, and M. A. Hearst, "Why phishing works, " in Proceedings of the 2006 Conference on Human Factors in Computing Systems (CHI), Montréal, Québec, Canada. ACM, 2006, pp. 581-590.
-
(2006)
Proceedings of the 2006 Conference on Human Factors in Computing Systems (CHI), Montréal, Québec, Canada
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.A.3
-
5
-
-
77954319839
-
Towards secure SOAP message exchange in a SOA
-
ACM Press
-
M. A. Rahaman, A. Schaad, and M. Rits, "Towards secure SOAP message exchange in a SOA, " in SWS '06: Proceedings of the 3rd ACM workshop on Secure Web Services. ACM Press, 2006, pp. 77-84.
-
(2006)
SWS '06: Proceedings of the 3rd ACM Workshop on Secure Web Services
, pp. 77-84
-
-
Rahaman, M.A.1
Schaad, A.2
Rits, M.3
-
6
-
-
74049118181
-
Breaking and fixing the inline approach
-
New York, NY, USA: ACM
-
S. Gajek, L. Liao, and J. Schwenk, "Breaking and fixing the inline approach, " in SWS '07: Proceedings of the 2007 ACM workshop on Secure web services. New York, NY, USA: ACM, 2007, pp. 37-43.
-
(2007)
SWS '07: Proceedings of the 2007 ACM Workshop on Secure Web Services
, pp. 37-43
-
-
Gajek, S.1
Liao, L.2
Schwenk, J.3
-
8
-
-
77949669849
-
-
[Online]. Available
-
Google, "Browser security handbook, " 2009. [Online]. Available: http://code.google.com/p/browsersec/.
-
(2009)
Browser Security Handbook
-
-
-
9
-
-
77954562422
-
-
D. Kaminski, "Dns server+client cache poisoning, issues with ssl, breaking *forgot my password* systems, attacking autoupdaters and unhardened parsers, rerouting internal traffic; http://www.doxpara.com/DMKBO2K8. ppt, " -, 2008.
-
(2008)
Dns Server+client Cache Poisoning, Issues with ssl, Breaking *Forgot My Password* Systems, Attacking Autoupdaters and Unhardened Parsers, Rerouting Internal Traffic
-
-
Kaminski, D.1
-
10
-
-
38549139786
-
Drive-by pharming
-
S. Stamm, Z. Ramzan, and M. Jakobsson, "Drive-by pharming, " Indiana University Computer Science, Tech. Rep. 641, 2006.
-
(2006)
Indiana University Computer Science, Tech. Rep. 641
-
-
Stamm, S.1
Ramzan, Z.2
Jakobsson, M.3
-
11
-
-
0033719386
-
Risks of the passport single signon protocol
-
D. Kormann and A. Rubin, "Risks of the passport single signon protocol, " Computer Networks, vol. 33, no. 1-6, pp. 51-58, 2000.
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 51-58
-
-
Kormann, D.1
Rubin, A.2
-
14
-
-
70350406505
-
Risks of the cardspace protocol
-
Springer
-
S. Gajek, J. Schwenk, M. Steiner, and C. Xuan, "Risks of the cardspace protocol, " in ISC'09: Proceedings of the 12th Information Security Conference, LNCS. Springer, 2009.
-
(2009)
ISC'09: Proceedings of the 12th Information Security Conference, LNCS
-
-
Gajek, S.1
Schwenk, J.2
Steiner, M.3
Xuan, C.4
-
15
-
-
70349233396
-
On the insecurity of microsoft's identity metasystem cardspace
-
X. Chen, S. Gajek, and J. Schwenk, "On the Insecurity of Microsoft's Identity Metasystem CardSpace, " Horst Görtz Institute for IT-Security, Tech. Rep. 3, 2008.
-
(2008)
Horst Görtz Institute for IT-Security, Tech. Rep. 3
-
-
Chen, X.1
Gajek, S.2
Schwenk, J.3
-
16
-
-
84873909966
-
TLS-Federation- A secure and relying-party-friendly approach for Federated Identity Management
-
B. P. Bruegger, D. Hühnlein, and J. Schwenk, "TLSFederation - A secure and Relying-Party-friendly approach for Federated Identity Management, " in Proceedings of BIOSIG 2008: Biometrics and Electronic Signatures, LNI 137, 2008, pp. 93-104.
-
(2008)
Proceedings of BIOSIG 2008: Biometrics and Electronic Signatures, LNI
, vol.137
, pp. 93-104
-
-
Bruegger, B.P.1
Hühnlein, D.2
Schwenk, J.3
-
17
-
-
74349101040
-
-
Working Draft 09, 20.01.2009
-
T. Scavo, "SAML V2.0 Holder-of-Key Assertion Profile, " Working Draft 09, 20.01.2009, 2009, http://www.oasis-open.org/apps/org/workgroup/ security/download.php/30782/sstc-saml2-holder-of-key-draft-09.pdf.
-
(2009)
SAML V2.0 Holder-of-Key Assertion Profile
-
-
Scavo, T.1
-
18
-
-
57049132145
-
A browser-based kerberos authentication scheme
-
Springer
-
S. Gajek, T. Jager, M. Manulis, and J. Schwenk, "A Browser-based Kerberos Authentication Scheme, " in Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, LNCS 5283. Springer, 2008, pp. 115-129.
-
(2008)
Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, LNCS
, vol.5283
, pp. 115-129
-
-
Gajek, S.1
Jager, T.2
Manulis, M.3
Schwenk, J.4
-
21
-
-
33646164715
-
UDDI version 3.0.2
-
L. Clement, A. Hately, C. von Riegen, and T. Rogers, "UDDI Version 3.0.2, " OASIS UDDI Spec Technical Committee Draft, 2004.
-
(2004)
OASIS UDDI Spec Technical Committee Draft
-
-
Clement, L.1
Hately, A.2
Von Riegen, C.3
Rogers, T.4
-
22
-
-
49049087362
-
The impact of flooding attacks on network-based services
-
M. Jensen, N. Gruschka, and N. Luttenberger, "The Impact of Flooding Attacks on Network-based Services, " in Proceedings of the IEEE International Conference on Availability, Reliability and Security (ARES), 2008.
-
(2008)
Proceedings of the IEEE International Conference on Availability, Reliability and Security (ARES)
-
-
Jensen, M.1
Gruschka, N.2
Luttenberger, N.3
|