Sciweavers

776 search results - page 18 / 156
» Securing user inputs for the web
Sort
View
INTERACT
2003
13 years 10 months ago
User Interface Transformation Method for PC Remote Control with Small Mobile Devices
: One problem with controlling remote PCs via small mobile devices such as cellular phones is the difference between PC GUIs and mobile device UIs (screen sizes, input devices etc....
Hidehiko Okada, Toshiyuki Asahi
WWW
2008
ACM
14 years 9 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
ICSM
2005
IEEE
14 years 2 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...
WWW
2005
ACM
14 years 9 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
PET
2010
Springer
14 years 22 days ago
Anonymous Webs of Trust
Abstract. Webs of trust constitute a decentralized infrastructure for establishing the authenticity of the binding between public keys and users and, more generally, trust relation...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...