[go: up one dir, main page]

Bellovin - Google Patents

Building a Secure Web Browser

Bellovin

View PDF
Document ID
18121908615243187868
Author
Bellovin S

External Links

Snippet

Over the last several years, popular applications such as Microsoft Internet Explorer and Netscape Navigator have become prime targets of attacks. These applications are targeted because their function is to process unauthenticated network data that often carry active …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Fredj et al. An OWASP top ten driven survey on web application protection methods
Prevelakis et al. Sandboxing Applications.
Ioannidis et al. Sub-operating systems: A new approach to application security
Loscocco et al. The inevitability of failure: The flawed assumption of security in modern computing environments
Gollmann Computer security
Rubin et al. Mobile code security
Wagner Janus: an approach for confinement of untrusted applications
US6836888B1 (en) System for reverse sandboxing
US5958050A (en) Trusted delegation system
US8732794B2 (en) Browser plug-in firewall
US9218487B2 (en) Remote DOM access
US20010025311A1 (en) Access control system
US20080229413A1 (en) Authorizing Information Flows
USH2279H1 (en) Method for prevention of cross site request forgery attack
Demchenko et al. Web services and grid security vulnerabilities and threats analysis and model
JP2002517852A (en) Method and system for securely executing untrusted content
Anupam et al. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies.
Jammalamadaka et al. Delegate: A proxy based architecture for secure website access from an untrusted machine
JP2000207363A (en) User access controller
US8782797B2 (en) Lockbox for mitigating same origin policy failures
Almushiti et al. An Investigation of broken access control types, vulnerabilities, protection, and security
US11985165B2 (en) Detecting web resources spoofing through stylistic fingerprints
Fernandez et al. More Patterns for Operating System Access Control.
KR20060050768A (en) Access authorization API
Nagaratnam et al. Resource access control for an internet user agent