-
1
-
-
79955989207
-
Improving multi-tier security using redundant authentication
-
New York, NY, USA, ACM
-
J. P. Boyer, R. Hasan, L. E. Olson, N. Borisov, C. A. Gunter, and D. Raila. Improving multi-tier security using redundant authentication. In CSAW '07: Proceedings of the 2007 ACM workshop on Computer security architecture, pages 54-62, New York, NY, USA, 2007. ACM.
-
(2007)
CSAW '07: Proceedings of the 2007 ACM Workshop on Computer Security Architecture
, pp. 54-62
-
-
Boyer, J.P.1
Hasan, R.2
Olson, L.E.3
Borisov, N.4
Gunter, C.A.5
Raila, D.6
-
2
-
-
77953855187
-
Using parse tree validation to prevent SQL injection attacks
-
New York, NY, USA, ACM
-
G. Buehrer, B. W. Weide, and P. A. G. Sivilotti. Using parse tree validation to prevent SQL injection attacks. In SEM '05: Proceedings of the 5th international workshop on Software engineering and middleware, pages 106-113, New York, NY, USA, 2005. ACM.
-
(2005)
SEM '05: Proceedings of the 5th International Workshop on Software Engineering and Middleware
, pp. 106-113
-
-
Buehrer, G.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
3
-
-
84894039463
-
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications
-
Montreal, Canada, August
-
M. Dalton, C. Kozyrakis, and N. Zeldovich. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. In Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, August 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
-
-
Dalton, M.1
Kozyrakis, C.2
Zeldovich, N.3
-
5
-
-
85175130027
-
Diesel: Applying privilege separation to database access
-
University of California, Berkeley, Dec
-
A. P. Felt, M. Finifter, J. Weinberger, and D. Wagner. Diesel: Applying privilege separation to database access. Technical Report UCB/EECS-2010-149, EEC-S Department, University of California, Berkeley, Dec 2010.
-
(2010)
Technical Report UCB/EECS-2010-149, EEC-S Department
-
-
Felt, A.P.1
Finifter, M.2
Weinberger, J.3
Wagner, D.4
-
7
-
-
84976657250
-
An authorization mechanism for a relational database system
-
P. P. Griffiths and B. W. Wade. An authorization mechanism for a relational database system. ACM Trans. Database Syst., 1(3):242-255, 1976.
-
(1976)
ACM Trans. Database Syst.
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
8
-
-
77952407110
-
AMNESIA: Analysis and monitoring for neutralizing sql-injection attacks
-
Long Beach, CA, USA, November
-
W. Halfond and A. Orso. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In Proceedings of the IEEE and ACM International Conference on Automated Software Engineering (ASE 2005), pages 174-183, Long Beach, CA, USA, November 2005.
-
(2005)
Proceedings of the IEEE and ACM International Conference on Automated Software Engineering (ASE 2005)
, pp. 174-183
-
-
Halfond, W.1
Orso, A.2
-
9
-
-
40449116802
-
A classification of sql-injection attacks and countermeasures
-
Arlington, VA, USA, March
-
W. G. Halfond, J. Viegas, and A. Orso. A Classification of SQL-Injection Attacks and Countermeasures. In Proceedings of the IEEE International Symposium on Secure Software Engineering, Arlington, VA, USA, March 2006.
-
(2006)
Proceedings of the IEEE International Symposium on Secure Software Engineering
-
-
Halfond, W.G.1
Viegas, J.2
Orso, A.3
-
11
-
-
34250649785
-
Redundancy and information leakage in fine-grained access control
-
DOI 10.1145/1142473.1142489, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
-
G. Kabra, R. Ramamurthy, and S. Sudarshan. Redundancy and information leakage in fine-grained access control. In SIGMOD '06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pages 133-144, New York, NY, USA, 2006. ACM. (Pubitemid 46946508)
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 133-144
-
-
Kabra, G.1
Ramamurthy, R.2
Sudarshan, S.3
-
14
-
-
0024752925
-
Security in a secure capability-based system
-
C. R. Landau. Security in a secure capability-based system. SIGOPS Oper. Syst. Rev., 23(4):2-4, 1989.
-
(1989)
SIGOPS Oper. Syst. Rev.
, vol.23
, Issue.4
, pp. 2-4
-
-
Landau, C.R.1
-
19
-
-
34547636298
-
-
PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May
-
M. S. Miller. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May 2006.
-
(2006)
Robust Composition: towards A Unified Approach to Access Control and Concurrency Control.
-
-
Miller, M.S.1
-
20
-
-
84881361956
-
-
MySQL Proxy. http://forge.mysql.com/wiki/MySQL-Proxy.
-
MySQL Proxy.
-
-
-
21
-
-
69949149767
-
A formal framework for reflective database access control policies
-
New York, NY, USA, ACM
-
L. E. Olson, C. A. Gunter, and P. Madhusudan. A Formal Framework for Reflective Database Access Control Policies. In CCS '08: Proceedings of the 15th ACM conference on Computer and Communications Security, pages 289-298, New York, NY, USA, 2008. ACM.
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 289-298
-
-
Olson, L.E.1
Gunter, C.A.2
Madhusudan, P.3
-
23
-
-
70449632684
-
CLAMP: Practical prevention of large-scale data leaks
-
Oakland, CA, May
-
B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig. CLAMP: Practical prevention of large-scale data leaks. In Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 2009.
-
(2009)
Proc. IEEE Symposium on Security and Privacy
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
-
24
-
-
85048404745
-
Preventing privilege escalation
-
Berkeley, CA, USA, USENIX Association
-
N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium, pages 16-16, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
SSYM'03: Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 16-16
-
-
Provos, N.1
Friedl, M.2
Honeyman, P.3
-
25
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
New York, NY, USA, ACM
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pages 551-562, New York, NY, USA, 2004. ACM.
-
(2004)
SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
26
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
27
-
-
0001421170
-
EROS: A fast capability system
-
J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: a fast capability system. In SOSP '99: Proceedings of the seventeenth ACM Symposium on Operating Systems Principles, pages 170-185, New York, NY, USA, 1999. ACM. (Pubitemid 129548355)
-
(1999)
Operating Systems Review (ACM)
, vol.33
, Issue.5
, pp. 170-185
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
28
-
-
85175132293
-
-
Sun Microsystems, Inc. Connection pooling, 2008.http://java.sun.com/ developer/onlineTraining/Programming/JDCBook/conpool.html#pool.
-
(2008)
Connection Pooling
-
-
-
29
-
-
38549128867
-
Using automated fix generation to secure SQL statements
-
Washington, DC, USA, IEEE Computer Society
-
S. Thomas and L. Williams. Using Automated Fix Generation to Secure SQL Statements. In SESS '07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems, page 9, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SESS '07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems
, pp. 9
-
-
Thomas, S.1
Williams, L.2
|