Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2008
SMash: secure component model for cross-domain mashups on unmodified browsers
WWW '08: Proceedings of the 17th international conference on World Wide WebPages 535–544https://doi.org/10.1145/1367497.1367570Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user experience provided by desktop applications. Current browser security models ...
- research-articleApril 2008
Forcehttps: protecting high-security web sites from network attacks
WWW '08: Proceedings of the 17th international conference on World Wide WebPages 525–534https://doi.org/10.1145/1367497.1367569As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attackers, but real-world deployments must cope with misconfigured servers, ...
- research-articleApril 2008
Better abstractions for secure server-side scripting
WWW '08: Proceedings of the 17th international conference on World Wide WebPages 507–516https://doi.org/10.1145/1367497.1367566It is notoriously difficult to program a solid web application. Besides addressing web interactions, state maintenance, and whimsical user navigation behaviors, programmers must also avoid a minefield of security vulnerabilities. The problem is twofold. ...
- research-articleApril 2008
Secure or insure?: a game-theoretic analysis of information security games
WWW '08: Proceedings of the 17th international conference on World Wide WebPages 209–218https://doi.org/10.1145/1367497.1367526Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remains highly variable across the Internet population, allowing attacks such as ...