Sciweavers

452 search results - page 26 / 91
» Exposing private information by timing web applications
Sort
View
ICISS
2009
Springer
13 years 5 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
ESORICS
2010
Springer
13 years 8 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
WWW
2009
ACM
14 years 8 months ago
Estimating the impressionrank of web pages
The ImpressionRank of a web page (or, more generally, of a web site) is the number of times users viewed the page while browsing search results. ImpressionRank captures the visibi...
Ziv Bar-Yossef, Maxim Gurevich
WWW
2004
ACM
14 years 8 months ago
Fine-grained, structured configuration management for web projects
Researchers in Web engineering have regularly noted that existing Web application development environments provide little support for managing the evolution of Web applications. K...
Tien Nhut Nguyen, Ethan V. Munson, Cheng Thao
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...