Sciweavers

1943 search results - page 131 / 389
» Web application security engineering
Sort
View
PVLDB
2008
144views more  PVLDB 2008»
14 years 9 months ago
Mining search engine query logs via suggestion sampling
Many search engines and other web applications suggest auto-completions as the user types in a query. The suggestions are generated from hidden underlying databases, such as query...
Ziv Bar-Yossef, Maxim Gurevich
IEEEARES
2007
IEEE
15 years 4 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
MIR
2010
ACM
234views Multimedia» more  MIR 2010»
15 years 4 months ago
ACQUINE: aesthetic quality inference engine - real-time automatic rating of photo aesthetics
We present ACQUINE - Aesthetic Quality Inference Engine, a publicly accessible system which allows users to upload their photographs and have them rated automatically for aestheti...
Ritendra Datta, James Ze Wang
ESORICS
2011
Springer
13 years 9 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
ICSE
2004
IEEE-ACM
15 years 10 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde