Ic

Results: 14218



#Item
11Computing / Computer security / Software engineering / Computer access control / Cloud standards / Hacking / Computer network security / Web development / JavaScript / HTTP cookie / Cross-site scripting / Cross-site request forgery

Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan INRIA Paris-Rocquencourt Antoine Delignat-Lavaud INRIA Paris-Rocquencourt

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-01-06 10:00:12
12Computing / Computer access control / Computer security / Cloud standards / Federated identity / Security / OAuth / Cross-site request forgery / OpenID / Cross-site scripting / Social login / HTTP cookie

Discovering Concrete Attacks on Website Authorization by Formal Analysis

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-01-06 10:29:30
13

A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud Daniele Filaretti

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-04-07 04:56:31
    14Process calculi / Theoretical computer science / -calculus / Process calculus / Computability theory / Markov models / Computer science / Normal distribution / Cognitive science / Algorithm characterizations

    Modelling Dynamic Web Data ? Philippa Gardner, Sergio Maffeis ∗ Department of Computing 180 Queen’s Gate, South Kensington Campus, Imperial College London SW7 2AZ, UK.

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    15Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

    The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-01-15 12:55:59
    16Software engineering / Computing / Computer programming / Functional languages / Control flow / High-level programming languages / Programming language comparisons / Programming language syntax / Eval / JavaScript / Scope / Dynamic programming language

    Isolating JavaScript with Filters, Rewriting, and Wrappers Sergio Maffeis1 , John C. Mitchell2 , and Ankur Taly2 1 Imperial College London

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    17Computing / Software engineering / Computer programming / Functional languages / Web programming / HTML / Hacking / Cross-site scripting / Ajax / JavaScript / Code injection / HTTP cookie

    Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg Sebastian Lekies

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2018-02-20 10:22:48
    18Computing / Data management / Data / Information / Technical communication / Process calculi / File sharing / Business intelligence / Data integration / Effi / Database / -calculus

    Behavioural Equivalences for Dynamic Web Data Sergio Maffeis Philippa Gardner Department of Computing, Imperial College London {maffeis,pg}@doc.ic.ac.uk Abstract

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    19Software engineering / Computer programming / Computing / High-level programming languages / Functional languages / Cross-platform software / Scripting languages / JavaScript / Web programming / Scope / Eval / C Sharp

    Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. Mitchell

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    20Computer security / Computing / Cyberwarfare / Computer network security / Hacking / Web applications / OWASP / Web application security / Security / Application security / XML external entity attack / SQL injection

    OWASP TopThe Ten Most Critical Web Application Security Risks https://owasp.org This work is licensed under a

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2018-03-08 11:23:41
    UPDATE