ºÝºÝߣshows by User: xeon40 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: xeon40 / Wed, 20 Jun 2012 03:36:15 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: xeon40 Processes of PKIs, within health Telematics infrastructure /xeon40/processes-of-pk-is-within-health-telematics-infrastructure processesofpkiswithinhealthtelematicsinfrastructure-120620033616-phpapp01
]]>

]]>
Wed, 20 Jun 2012 03:36:15 GMT /xeon40/processes-of-pk-is-within-health-telematics-infrastructure xeon40@slideshare.net(xeon40) Processes of PKIs, within health Telematics infrastructure xeon40 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/processesofpkiswithinhealthtelematicsinfrastructure-120620033616-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Processes of PKIs, within health Telematics infrastructure from Zdravko Danailov
]]>
959 7 https://cdn.slidesharecdn.com/ss_thumbnails/processesofpkiswithinhealthtelematicsinfrastructure-120620033616-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DOM-based XSS Attacks /slideshow/domxssdandel160412sw-120611112646phpapp01/13303745 domxssdandel160412sw-120611112646-phpapp01-120613023145-phpapp01
Concerning the matter of modern Internet Security, we are obliged to understand the meaning and proper utilization of Web Application Security and Web Services Security. In this paper, we discuss one of the recent and misunderstood problems, related to Web Application Security. In distinction to the standard Web Application Cross-Site Scripting Attack Vector, DOM-based XSS conveys a way to inject malicious payload on Layer 7 ISO/OSI Model on the client-side implementation of the Web-Application logic. Precisely, DOMXSS represents a subclass of this dominant Web Application Attack Vector – XSS. Therefore, we observe the comprehensive environmental aspects of DOMXSS; we divide them in two layers – Programming environment, which concerns the DOM Abstraction Model, Web-Application coding language and the rendering engine of the Web client (Web-Browser); and Implementation environment – the Web Application programming logic and source code. Because of the fact, that this subclass, should be still considered as misapprehended and consequentially – systematically avoided by the security and scientific communities, the main objectives of this project thesis are: proposing and evaluating of related categorizations and meta-model, demonstration of case studies and sanitization best practices, and further propositions across the problem – DOM-based XSS attacks.]]>

Concerning the matter of modern Internet Security, we are obliged to understand the meaning and proper utilization of Web Application Security and Web Services Security. In this paper, we discuss one of the recent and misunderstood problems, related to Web Application Security. In distinction to the standard Web Application Cross-Site Scripting Attack Vector, DOM-based XSS conveys a way to inject malicious payload on Layer 7 ISO/OSI Model on the client-side implementation of the Web-Application logic. Precisely, DOMXSS represents a subclass of this dominant Web Application Attack Vector – XSS. Therefore, we observe the comprehensive environmental aspects of DOMXSS; we divide them in two layers – Programming environment, which concerns the DOM Abstraction Model, Web-Application coding language and the rendering engine of the Web client (Web-Browser); and Implementation environment – the Web Application programming logic and source code. Because of the fact, that this subclass, should be still considered as misapprehended and consequentially – systematically avoided by the security and scientific communities, the main objectives of this project thesis are: proposing and evaluating of related categorizations and meta-model, demonstration of case studies and sanitization best practices, and further propositions across the problem – DOM-based XSS attacks.]]>
Wed, 13 Jun 2012 02:31:42 GMT /slideshow/domxssdandel160412sw-120611112646phpapp01/13303745 xeon40@slideshare.net(xeon40) DOM-based XSS Attacks xeon40 Concerning the matter of modern Internet Security, we are obliged to understand the meaning and proper utilization of Web Application Security and Web Services Security. In this paper, we discuss one of the recent and misunderstood problems, related to Web Application Security. In distinction to the standard Web Application Cross-Site Scripting Attack Vector, DOM-based XSS conveys a way to inject malicious payload on Layer 7 ISO/OSI Model on the client-side implementation of the Web-Application logic. Precisely, DOMXSS represents a subclass of this dominant Web Application Attack Vector – XSS. Therefore, we observe the comprehensive environmental aspects of DOMXSS; we divide them in two layers – Programming environment, which concerns the DOM Abstraction Model, Web-Application coding language and the rendering engine of the Web client (Web-Browser); and Implementation environment – the Web Application programming logic and source code. Because of the fact, that this subclass, should be still considered as misapprehended and consequentially – systematically avoided by the security and scientific communities, the main objectives of this project thesis are: proposing and evaluating of related categorizations and meta-model, demonstration of case studies and sanitization best practices, and further propositions across the problem – DOM-based XSS attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/domxssdandel160412sw-120611112646-phpapp01-120613023145-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Concerning the matter of modern Internet Security, we are obliged to understand the meaning and proper utilization of Web Application Security and Web Services Security. In this paper, we discuss one of the recent and misunderstood problems, related to Web Application Security. In distinction to the standard Web Application Cross-Site Scripting Attack Vector, DOM-based XSS conveys a way to inject malicious payload on Layer 7 ISO/OSI Model on the client-side implementation of the Web-Application logic. Precisely, DOMXSS represents a subclass of this dominant Web Application Attack Vector – XSS. Therefore, we observe the comprehensive environmental aspects of DOMXSS; we divide them in two layers – Programming environment, which concerns the DOM Abstraction Model, Web-Application coding language and the rendering engine of the Web client (Web-Browser); and Implementation environment – the Web Application programming logic and source code. Because of the fact, that this subclass, should be still considered as misapprehended and consequentially – systematically avoided by the security and scientific communities, the main objectives of this project thesis are: proposing and evaluating of related categorizations and meta-model, demonstration of case studies and sanitization best practices, and further propositions across the problem – DOM-based XSS attacks.
DOM-based XSS Attacks from Zdravko Danailov
]]>
2473 7 https://cdn.slidesharecdn.com/ss_thumbnails/domxssdandel160412sw-120611112646-phpapp01-120613023145-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Privacy preserving back up and recovery of emergency data /slideshow/privacy-preserving-back-up-and-recovery-of-emergency-data/12619722 privacypreservingback-upandrecoveryofemergencydata-120420092750-phpapp02
]]>

]]>
Fri, 20 Apr 2012 09:27:49 GMT /slideshow/privacy-preserving-back-up-and-recovery-of-emergency-data/12619722 xeon40@slideshare.net(xeon40) Privacy preserving back up and recovery of emergency data xeon40 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/privacypreservingback-upandrecoveryofemergencydata-120420092750-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Privacy preserving back up and recovery of emergency data from Zdravko Danailov
]]>
864 3 https://cdn.slidesharecdn.com/ss_thumbnails/privacypreservingback-upandrecoveryofemergencydata-120420092750-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Attacks on mobile ad hoc networks /slideshow/attacks-on-mobile-ad-hoc-networks-12619703/12619703 attacksonmobileadhocnetworks-120420092725-phpapp01
]]>

]]>
Fri, 20 Apr 2012 09:27:23 GMT /slideshow/attacks-on-mobile-ad-hoc-networks-12619703/12619703 xeon40@slideshare.net(xeon40) Attacks on mobile ad hoc networks xeon40 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/attacksonmobileadhocnetworks-120420092725-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Attacks on mobile ad hoc networks from Zdravko Danailov
]]>
9650 7 https://cdn.slidesharecdn.com/ss_thumbnails/attacksonmobileadhocnetworks-120420092725-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Attacks on mobile ad hoc networks https://de.slideshare.net/slideshow/attacks-on-mobile-ad-hoc-networks/12497296 attacksonmobileadhocnetworksmein-120411041037-phpapp02
Because of the designation of the mobile ad hoc networks (MANet), namely to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or no available organized infrastructure, is possible for two types of parties to participate in MANet - authentic network users as well as malicious attackers. This fact certainly arises the question about the security. In this paperwork we pay attention to the common attacks within MANet, which differ in their essence such as Blackhole attack, Flooding attack, jamming, Wormhole attack, traffic monitoring and analysis, DoS etc. and what can be done as ountermeasures against them.]]>

Because of the designation of the mobile ad hoc networks (MANet), namely to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or no available organized infrastructure, is possible for two types of parties to participate in MANet - authentic network users as well as malicious attackers. This fact certainly arises the question about the security. In this paperwork we pay attention to the common attacks within MANet, which differ in their essence such as Blackhole attack, Flooding attack, jamming, Wormhole attack, traffic monitoring and analysis, DoS etc. and what can be done as ountermeasures against them.]]>
Wed, 11 Apr 2012 04:10:35 GMT https://de.slideshare.net/slideshow/attacks-on-mobile-ad-hoc-networks/12497296 xeon40@slideshare.net(xeon40) Attacks on mobile ad hoc networks xeon40 Because of the designation of the mobile ad hoc networks (MANet), namely to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or no available organized infrastructure, is possible for two types of parties to participate in MANet - authentic network users as well as malicious attackers. This fact certainly arises the question about the security. In this paperwork we pay attention to the common attacks within MANet, which differ in their essence such as Blackhole attack, Flooding attack, jamming, Wormhole attack, traffic monitoring and analysis, DoS etc. and what can be done as ountermeasures against them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/attacksonmobileadhocnetworksmein-120411041037-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Because of the designation of the mobile ad hoc networks (MANet), namely to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or no available organized infrastructure, is possible for two types of parties to participate in MANet - authentic network users as well as malicious attackers. This fact certainly arises the question about the security. In this paperwork we pay attention to the common attacks within MANet, which differ in their essence such as Blackhole attack, Flooding attack, jamming, Wormhole attack, traffic monitoring and analysis, DoS etc. and what can be done as ountermeasures against them.
from Zdravko Danailov
]]>
837 70 https://cdn.slidesharecdn.com/ss_thumbnails/attacksonmobileadhocnetworksmein-120411041037-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Privacy Preserving Back-up and Recovery of Emergency Data /slideshow/privacy-preserving-backup-and-recovery-of-emergency-data/12339920 prsi-privacypreservingback-upandrecoveryofemergencydata-120410122831-phpapp01
The processes of back-up and recovery of emergency data play an important role within the Telematics system. Their completion has to be executed completely secure with no risk of a data loss and preserving the privacy of the patient. In this paper we will take a look at the existing/proposed scenario for back-up/recovery of emergency data and discuss the problems by its implementation. In order to improve this scenario and solve the problems we will put forward a new scenario.]]>

The processes of back-up and recovery of emergency data play an important role within the Telematics system. Their completion has to be executed completely secure with no risk of a data loss and preserving the privacy of the patient. In this paper we will take a look at the existing/proposed scenario for back-up/recovery of emergency data and discuss the problems by its implementation. In order to improve this scenario and solve the problems we will put forward a new scenario.]]>
Tue, 10 Apr 2012 12:28:30 GMT /slideshow/privacy-preserving-backup-and-recovery-of-emergency-data/12339920 xeon40@slideshare.net(xeon40) Privacy Preserving Back-up and Recovery of Emergency Data xeon40 The processes of back-up and recovery of emergency data play an important role within the Telematics system. Their completion has to be executed completely secure with no risk of a data loss and preserving the privacy of the patient. In this paper we will take a look at the existing/proposed scenario for back-up/recovery of emergency data and discuss the problems by its implementation. In order to improve this scenario and solve the problems we will put forward a new scenario. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/prsi-privacypreservingback-upandrecoveryofemergencydata-120410122831-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The processes of back-up and recovery of emergency data play an important role within the Telematics system. Their completion has to be executed completely secure with no risk of a data loss and preserving the privacy of the patient. In this paper we will take a look at the existing/proposed scenario for back-up/recovery of emergency data and discuss the problems by its implementation. In order to improve this scenario and solve the problems we will put forward a new scenario.
Privacy Preserving Back-up and Recovery of Emergency Data from Zdravko Danailov
]]>
471 3 https://cdn.slidesharecdn.com/ss_thumbnails/prsi-privacypreservingback-upandrecoveryofemergencydata-120410122831-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-xeon40-48x48.jpg?cb=1523246472 WebAppSec, DOMXSS, XSS, MANET, Apache XMLSec https://cdn.slidesharecdn.com/ss_thumbnails/processesofpkiswithinhealthtelematicsinfrastructure-120620033616-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds xeon40/processes-of-pk-is-within-health-telematics-infrastructure Processes of PKIs, wit... https://cdn.slidesharecdn.com/ss_thumbnails/domxssdandel160412sw-120611112646-phpapp01-120613023145-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/domxssdandel160412sw-120611112646phpapp01/13303745 DOM-based XSS Attacks https://cdn.slidesharecdn.com/ss_thumbnails/privacypreservingback-upandrecoveryofemergencydata-120420092750-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/privacy-preserving-back-up-and-recovery-of-emergency-data/12619722 Privacy preserving bac...