Sciweavers

3 search results - page 1 / 1
» Sensitive Data Requests: Do Sites Ask Correctly
Sort
View
ICC
2009
IEEE
122views Communications» more  ICC 2009»
13 years 11 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta
SAC
2006
ACM
13 years 11 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
IEEESP
2010
101views more  IEEESP 2010»
13 years 3 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato