Sciweavers

1527 search results - page 77 / 306
» A Survey of Web Security
Sort
View
CCS
2007
ACM
15 years 5 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 3 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
WWW
2002
ACM
16 years 1 days ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp
CSFW
2009
IEEE
15 years 6 months ago
Securing Timeout Instructions in Web Applications
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. Th...
Alejandro Russo, Andrei Sabelfeld
USENIX
2004
15 years 22 days ago
Building Secure High-Performance Web Services with OKWS
OKWS is a toolkit for building fast and secure Web services. It provides Web developers with a small set of tools that has proved powerful enough to build complex systems with lim...
Maxwell N. Krohn