Description: |
Mashups Legitimize Man-in-the-Middle Attacks, Security for Web 2.0 Application Scenarios: Exposures, Issues, and Challenges, JavaScript Breaks Free, More Content - Less Control: Access Control in the Web 2.0, Browser Models for Usable Authentication Protocols, Security Model for the Client-Side Web Application Environments, Towards Security by Construction for Web 2.0 Applications, Mashup Component Isolation via Server-Side Analysis and Instrumention, The Browser as a Secure Platform for Loosley Coupled, Private-Data Mashups, Securing PHP - Approaches to Web Application Security, Inference Detection Technology for Web 2.0, Medina: Combining Evidence to Build Trust, Detecting Deception in the Context of Web 2.0., Web Services Security: Challenges and Techniques, Formal Methods for Web 2.0 Security Protocols, Current Anti-Phishing Solutions and Yahoos Sign-in Seal, Access Control Requirements for Web 2.0 Security and Privacy, Input Validation of Client-Server Web Applications Through Static Analysis, Mutation-Event Transforms: A Flexible Client-side Foundation for End-to-end Web 2.0 Security.
|