Results 291 to 300 of about 1,157,333 (342)
Some of the next articles are maybe not open access.

Secured Web access

Proceedings 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2002
We discuss various secured Web access schemes using dynamic and static approaches. In a static approach the access environment, that is, the set of authorized users, the mode of access, their access rights, etc., are predefined. This approach is suitable only for a static set up where the user requirements do not change frequently.
M. Mohania   +3 more
openaire   +1 more source

Secure Web tunneling

Computer Networks and ISDN Systems, 1998
The boundary of an organization does not always coincide with its firewall. A member of an organization that is outside the firewall may wish to access internal Web services with the same ease and security that are common within the firewall. At the same time, the firewall should still be able to perform adequate access control, logging, and auditing ...
Martín Abadi   +3 more
openaire   +1 more source

Securing web content

Proceedings of the 2009 workshop on Re-architecting the internet, 2009
Security in the WWW architecture is based on authenticating the source server and securing the data during transport without considering the content itself. The traditional assumption is that a page is as secure as the server hosting it. However, modern web sites have often a composite structure where components of the web page are authored by ...
Joakim Koskela   +3 more
openaire   +1 more source

From web server security to web components security

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2004
Web servers are increasingly being adopted as a viable means to access Internet-based applications. Current solutions to secure Web servers are not comprehensive or robust enough to protect servers and applications from today's hackers. Protection profile gives us a systematic approach to examine the minimum-security requirements of a system. Therefore,
openaire   +1 more source

Security Intelligence: Web Contents Security System for Semantic Web

2006
WWW (World Wide Web) has incurred the problem that users are not necessarily provided with the information they want to receive, at a time when the amount of information is explosively increasing. Therefore, Tim Berners-Lee proposed the Semantic Web as the new web paradigm to solve this problem.
Nam-deok Cho, Eun-ser Lee, Hyun-gun Park
openaire   +1 more source

Securing Web applications

Information Security Technical Report, 2008
Web application vulnerabilities have become a major concern in software security. We will present major attack patterns, i.e. SQL injection, cross-site scripting, cross-site request forgery, JavaScript hijacking, and DNS rebinding, together with a survey and assessment of the countermeasures available to web application developers.
openaire   +1 more source

Web Site Security

2010
In the trenches, we hear it all the time: “My web site is hosted on a Mac. How could it be hacked?” or “My web site is too small. Why would anyone want to hack it?” Although it’s true that infiltrating and grabbing personal or business information from your web server might be significant, there are other reasons to break into a web server. For example,
Charles Edge   +3 more
openaire   +1 more source

Web engineering security

Proceedings of the 6th international conference on Web engineering - ICWE '06, 2006
There are a number of critical factors driving security in Web Engineering. These include: economic issues, people issues, and legislative issues. This paper presents the argument that a Security Improvement Approach (SIA), which can be applied to different Web engineering development processes, is essential to successfully addressing Web application ...
William Bradley Glisson   +2 more
openaire   +1 more source

Secure Web (Secure Sockets Layer)

2004
In this chapter, I’ll cover the following: What SSL is and why you might want to use it Installing the OpenSSL libraries What certificates are and how to install them Becoming your own Certificate Authority (CA) Configuring Apache for ...
openaire   +1 more source

Web Services Security

2010
This chapter surveys the context for web services security and discusses the issues and standards at every level of architectural. The authors attempt to evaluate the status of industrial practice with respect to the security of web services. They look at commercial products and their supporting levels, and end with some conclusions. They see a problem
Fernandez, Eduardo B.   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy