Performing sensitive online transactions using computers found in cybercafés and public libraries is risky. The untrusted nature of these machines creates a target rich environment. A simple keystroke logger, a common payload of many viruses, records and transmits the secret information (e.g., passwords, credit card numbers, PIN numbers) entered into these machines. In addition, sophisticated malware can hijack a user’s authenticated session to perform unauthorized transactions masquerading as the user. This paper presents Delegate, a proxy-based architecture that enables a user to access web sites without disclosing personal information to untrusted machines. Delegate enforces rules at the proxy to detect and prevent session hijacking. Thi...
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its se...
Delegated authorization protocols have become wide-spread to implement Web applications and services...
Password sharing is widely used as a means of delegating access, but it is open to abuse and relies ...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Mobile Agent (MA) technology is one of the most brilliantgrounds of scattered computing. Mobile agen...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
Internet technologies continue to revolutionize the legitimate collection of information from target...
IT systems rely on correct authentication of their users in order to provide confidentiality and int...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
We describe a resource discovery and communication sys-tem designed for security and privacy. All ob...
Abstract. Smart cards are commonly used for tasks with high security requirements such as digital si...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
Keylogging and phishing attacks can extract user identity and sensitive account information for unau...
In modern world enterprises use different computer networks to do their business. Most e-commerce we...
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its se...
Delegated authorization protocols have become wide-spread to implement Web applications and services...
Password sharing is widely used as a means of delegating access, but it is open to abuse and relies ...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Mobile Agent (MA) technology is one of the most brilliantgrounds of scattered computing. Mobile agen...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
Internet technologies continue to revolutionize the legitimate collection of information from target...
IT systems rely on correct authentication of their users in order to provide confidentiality and int...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
We describe a resource discovery and communication sys-tem designed for security and privacy. All ob...
Abstract. Smart cards are commonly used for tasks with high security requirements such as digital si...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
Keylogging and phishing attacks can extract user identity and sensitive account information for unau...
In modern world enterprises use different computer networks to do their business. Most e-commerce we...
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its se...
Delegated authorization protocols have become wide-spread to implement Web applications and services...
Password sharing is widely used as a means of delegating access, but it is open to abuse and relies ...