IC

Results: 14218



#Item
11Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan INRIA Paris-Rocquencourt Antoine Delignat-Lavaud INRIA Paris-Rocquencourt

Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan INRIA Paris-Rocquencourt Antoine Delignat-Lavaud INRIA Paris-Rocquencourt

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-01-06 10:00:12
12Discovering Concrete Attacks on Website Authorization by Formal Analysis

Discovering Concrete Attacks on Website Authorization by Formal Analysis

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-01-06 10:29:30
13A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud  Daniele Filaretti

A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud Daniele Filaretti

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-04-07 04:56:31
    14Modelling Dynamic Web Data ? Philippa Gardner, Sergio Maffeis ∗ Department of Computing 180 Queen’s Gate, South Kensington Campus, Imperial College London SW7 2AZ, UK.

    Modelling Dynamic Web Data ? Philippa Gardner, Sergio Maffeis ∗ Department of Computing 180 Queen’s Gate, South Kensington Campus, Imperial College London SW7 2AZ, UK.

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    15The Protection of Information in Computer Systems  JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

    The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-01-15 12:55:59
    16Isolating JavaScript with Filters, Rewriting, and Wrappers Sergio Maffeis1 , John C. Mitchell2 , and Ankur Taly2 1  Imperial College London

    Isolating JavaScript with Filters, Rewriting, and Wrappers Sergio Maffeis1 , John C. Mitchell2 , and Ankur Taly2 1 Imperial College London

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    17Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg   Sebastian Lekies

    Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg Sebastian Lekies

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2018-02-20 10:22:48
    18Behavioural Equivalences for Dynamic Web Data Sergio Maffeis Philippa Gardner Department of Computing, Imperial College London {maffeis,pg}@doc.ic.ac.uk Abstract

    Behavioural Equivalences for Dynamic Web Data Sergio Maffeis Philippa Gardner Department of Computing, Imperial College London {maffeis,pg}@doc.ic.ac.uk Abstract

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    19Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London   John C. Mitchell

    Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. Mitchell

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    20OWASP TopThe Ten Most Critical Web Application Security Risks https://owasp.org  This work is licensed under a

    OWASP TopThe Ten Most Critical Web Application Security Risks https://owasp.org This work is licensed under a

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2018-03-08 11:23:41