[go: up one dir, main page]

Quasthoff et al., 2007 - Google Patents

Why HTTPS Is Not Enough--A Signature-Based Architecture for Trusted Content on the Social Web

Quasthoff et al., 2007

View PDF
Document ID
3855217241687412685
Author
Quasthoff M
Sack H
Meinel C
Publication year
Publication venue
IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)

External Links

Snippet

Easy to use, interactive web applications accumulating data from heterogeneous sources represent a recent trend on the World Wide Web, referred to as the Social Web. There however, security standards are often disregarded in favor of interface design or brand new …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters

Similar Documents

Publication Publication Date Title
Brunner et al. Did and vc: Untangling decentralized identifiers and verifiable credentials for the web of trust
Deng et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Uzunov et al. Securing distributed systems using patterns: A survey
Jensen Federated identity management challenges
US8185733B2 (en) Method and apparatus for automatically publishing content based identifiers
US8688992B2 (en) System and method for generating agreements
US20120089841A1 (en) Digital signatures of composite resource documents
US20090013391A1 (en) Identification System and Method
South et al. Authenticated delegation and authorized ai agents
Mannan et al. Privacy-enhanced sharing of personal content on the web
Abubakar et al. A framework for enhancing digital trust of Quranic text using Blockchain technology
Alimehaj et al. Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology
Quasthoff et al. Why HTTPS Is Not Enough--A Signature-Based Architecture for Trusted Content on the Social Web
Gadelha Jr et al. Kairos: an architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems
Sinha et al. A formal solution to rewriting attacks on SOAP messages
Marian et al. Requirements Analysis for a System for Certifying Online Content
US20090044011A1 (en) Systems, Devices and Methods for Managing Cryptographic Authorizations
Tesink Improving intrusion detection systems through machine learning
Chatterjee et al. Public key infrastructure for named data networks
Quasthoff et al. Who reads and writes the social web? A security architecture for Web 2.0 applications
Morosi Study of authentication models and implementation of a prototype by using eID and Distributed Ledger Technologies.
Skinner et al. Shield privacy Hippocratic security method for virtual community
Geun-Hyung Blockchain for the Trustworthy Decentralized Web Architecture
Zhang et al. Secure Data Provenance
JP2005020651A (en) Time stamp information verification method