Sciweavers

495 search results - page 32 / 99
» On Privacy And The Web
Sort
View
ICDE
2003
IEEE
119views Database» more  ICDE 2003»
14 years 10 months ago
Implementing P3P Using Database Technology
Platform for Privacy Preferences (P3P) is the most significant effort currently underway to enable web users to gain control over their private information. P3P provides mechanism...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
ISSA
2004
13 years 10 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 3 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
CCS
2007
ACM
14 years 3 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
ACSAC
2008
IEEE
14 years 3 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...