Sciweavers

164 search results - page 5 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
WWW
2006
ACM
14 years 8 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
INTR
2007
100views more  INTR 2007»
13 years 7 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
INTERACT
2003
13 years 8 months ago
The Pragmatic Web: Agent-Based Multimodal Web Interaction with no Browser in Sight
: To a large degree information has become accessible – anytime, anywhere – but not necessarily useful. Unless the right information is presented at the right time, in the righ...
Alexander Repenning, James Sullivan
NTMS
2008
IEEE
14 years 1 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
WWW
2004
ACM
14 years 8 months ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger