Sciweavers

1527 search results - page 65 / 306
» A Survey of Web Security
Sort
View
WWW
2008
ACM
16 years 4 hour ago
A larger scale study of robots.txt
A website can regulate search engine crawler access to its content using the robots exclusion protocol, specified in its robots.txt file. The rules in the protocol enable the site...
Santanu Kolay
WWW
2008
ACM
16 years 4 hour ago
Protecting the web: phishing, malware, and other security threats
Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Ed...
ICETE
2004
129views Business» more  ICETE 2004»
15 years 21 days ago
Data Mining Techniques for Security of Web Services
Manu Malek, Fotios C. Harmantzis
WWW
2010
ACM
15 years 6 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
CN
2004
127views more  CN 2004»
14 years 11 months ago
Intermediary infrastructures for the World Wide Web
Intermediaries are software entities, deployed on hosts of the wireline and wireless network, that mediate the interaction between clients and servers of the World Wide Web. In th...
Marios D. Dikaiakos