Sciweavers

776 search results - page 61 / 156
» Securing user inputs for the web
Sort
View
137
Voted
CHI
2011
ACM
14 years 7 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
162
Voted
CCS
2010
ACM
15 years 3 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
125
Voted
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 7 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
136
Voted
CHI
2001
ACM
16 years 3 months ago
Accordion summarization for end-game browsing on PDAs and cellular phones
We demonstrate a new browsing technique for devices with small displays such as PDAs or cellular phones. We concentrate on end-game browsing, where the user is close to or on the ...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...
110
Voted
WWW
2008
ACM
16 years 4 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...