Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Weippl, Edgar Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Schrittwieser S., Katzenbeisser S., Kinder J., Merzdovnik G., Weippl E. ACM Computing Surveys 49(1): 1-37, 2016.  Type: Article

Software obfuscation is an attempt to hide the real intent of a piece of software. The first obfuscated malware appeared in 1986, and sophistication has steadily increased since then. Commercial vendors obfuscate their software to bloc...
...
Jun 22 2016  
  Digital forensics for enterprise rights management systems
Schrittwieser S., Kieseberg P., Weippl E.  IIWAS 2012 (Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali, Indonesia, Dec 3-5, 2012) 111-120, 2012.  Type: Proceedings

Enterprise rights management (ERM) is concerned with managing and protecting data in an enterprise context. Digital forensics issues run into considerations of encryption and access protection. Existing guidelines and standards, such a...
...
May 16 2013  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy