Sciweavers

164 search results - page 5 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
WWW
2006
ACM
15 years 10 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
INTR
2007
100views more  INTR 2007»
14 years 9 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
77
Voted
INTERACT
2003
14 years 11 months ago
The Pragmatic Web: Agent-Based Multimodal Web Interaction with no Browser in Sight
: To a large degree information has become accessible – anytime, anywhere – but not necessarily useful. Unless the right information is presented at the right time, in the righ...
Alexander Repenning, James Sullivan
83
Voted
NTMS
2008
IEEE
15 years 4 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
WWW
2004
ACM
15 years 10 months ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger