Sciweavers

164 search results - page 19 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
CCS
2010
ACM
13 years 2 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
ICWS
2004
IEEE
13 years 8 months ago
Building Desktop Applications with Web Services in a Message-based MVC Paradigm
Over the past decade, classic client side applications with Model-View-Controller (MVC) architecture haven't changed much but become more complex. In this paper, we present a...
Xiaohong Qiu
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 5 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
DDECS
2007
IEEE
80views Hardware» more  DDECS 2007»
14 years 1 months ago
Design Platform for Quick Integration of an Internet Connectivity into System-on-Chips
— The paper describes pre-integrated subsystem consisting of a configurable 8-bit microcontroller and an Internet connection solution. The latter integrates Ethernet Media Access...
Bartosz Wojciechowski, Tomasz Kowalczyk, Wojciech ...
ICDCIT
2004
Springer
14 years 24 days ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller