Bellovin - Google Patents
Building a Secure Web BrowserBellovin
View PDF- Document ID
- 18121908615243187868
- Author
- Bellovin S
External Links
Snippet
Over the last several years, popular applications such as Microsoft Internet Explorer and Netscape Navigator have become prime targets of attacks. These applications are targeted because their function is to process unauthenticated network data that often carry active …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fredj et al. | An OWASP top ten driven survey on web application protection methods | |
Prevelakis et al. | Sandboxing Applications. | |
Ioannidis et al. | Sub-operating systems: A new approach to application security | |
Loscocco et al. | The inevitability of failure: The flawed assumption of security in modern computing environments | |
Gollmann | Computer security | |
Rubin et al. | Mobile code security | |
Wagner | Janus: an approach for confinement of untrusted applications | |
US6836888B1 (en) | System for reverse sandboxing | |
US5958050A (en) | Trusted delegation system | |
US8732794B2 (en) | Browser plug-in firewall | |
US9218487B2 (en) | Remote DOM access | |
US20010025311A1 (en) | Access control system | |
US20080229413A1 (en) | Authorizing Information Flows | |
USH2279H1 (en) | Method for prevention of cross site request forgery attack | |
Demchenko et al. | Web services and grid security vulnerabilities and threats analysis and model | |
JP2002517852A (en) | Method and system for securely executing untrusted content | |
Anupam et al. | Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. | |
Jammalamadaka et al. | Delegate: A proxy based architecture for secure website access from an untrusted machine | |
JP2000207363A (en) | User access controller | |
US8782797B2 (en) | Lockbox for mitigating same origin policy failures | |
Almushiti et al. | An Investigation of broken access control types, vulnerabilities, protection, and security | |
US11985165B2 (en) | Detecting web resources spoofing through stylistic fingerprints | |
Fernandez et al. | More Patterns for Operating System Access Control. | |
KR20060050768A (en) | Access authorization API | |
Nagaratnam et al. | Resource access control for an internet user agent |