Quasthoff et al., 2007 - Google Patents
Why HTTPS Is Not Enough--A Signature-Based Architecture for Trusted Content on the Social WebQuasthoff et al., 2007
View PDF- Document ID
- 3855217241687412685
- Author
- Quasthoff M
- Sack H
- Meinel C
- Publication year
- Publication venue
- IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)
External Links
Snippet
Easy to use, interactive web applications accumulating data from heterogeneous sources represent a recent trend on the World Wide Web, referred to as the Social Web. There however, security standards are often disregarded in favor of interface design or brand new …
- 238000011160 research 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Brunner et al. | Did and vc: Untangling decentralized identifiers and verifiable credentials for the web of trust | |
Deng et al. | A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements | |
Uzunov et al. | Securing distributed systems using patterns: A survey | |
Jensen | Federated identity management challenges | |
US8185733B2 (en) | Method and apparatus for automatically publishing content based identifiers | |
US8688992B2 (en) | System and method for generating agreements | |
US20120089841A1 (en) | Digital signatures of composite resource documents | |
US20090013391A1 (en) | Identification System and Method | |
South et al. | Authenticated delegation and authorized ai agents | |
Mannan et al. | Privacy-enhanced sharing of personal content on the web | |
Abubakar et al. | A framework for enhancing digital trust of Quranic text using Blockchain technology | |
Alimehaj et al. | Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology | |
Quasthoff et al. | Why HTTPS Is Not Enough--A Signature-Based Architecture for Trusted Content on the Social Web | |
Gadelha Jr et al. | Kairos: an architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems | |
Sinha et al. | A formal solution to rewriting attacks on SOAP messages | |
Marian et al. | Requirements Analysis for a System for Certifying Online Content | |
US20090044011A1 (en) | Systems, Devices and Methods for Managing Cryptographic Authorizations | |
Tesink | Improving intrusion detection systems through machine learning | |
Chatterjee et al. | Public key infrastructure for named data networks | |
Quasthoff et al. | Who reads and writes the social web? A security architecture for Web 2.0 applications | |
Morosi | Study of authentication models and implementation of a prototype by using eID and Distributed Ledger Technologies. | |
Skinner et al. | Shield privacy Hippocratic security method for virtual community | |
Geun-Hyung | Blockchain for the Trustworthy Decentralized Web Architecture | |
Zhang et al. | Secure Data Provenance | |
JP2005020651A (en) | Time stamp information verification method |