-
1
-
-
14944340027
-
-
G. A. Di Lucca, A. R. Fasolino, M. Mastoianni, P. Tramontana, Identifying Cross Site Scripting Vulnerabilities in Web Applications, wse, pp. 71-80, Sixth IEEE International Workshop on Web Site Evolution(WSE'04), 2004
-
G. A. Di Lucca, A. R. Fasolino, M. Mastoianni, P. Tramontana, "Identifying Cross Site Scripting Vulnerabilities in Web Applications," wse, pp. 71-80, Sixth IEEE International Workshop on Web Site Evolution(WSE'04), 2004
-
-
-
-
2
-
-
35148825981
-
-
Jesse James Garrett, Ajax: A New Approach to Web Applications, available at http://www.adaptivepath.com/publications/ essays/archives/00038S.php (Adaptive Path, February 2005), last accessed Feb 12th, 2006.
-
Jesse James Garrett, "Ajax: A New Approach to Web Applications," available at http://www.adaptivepath.com/publications/ essays/archives/00038S.php (Adaptive Path, February 2005), last accessed Feb 12th, 2006.
-
-
-
-
3
-
-
33646930633
-
-
Kehh Smith, Simplifying Ajax-Style Web Development, Computer, 39, no. S, pp. 98-101, May, 2006.
-
[3]Kehh Smith, "Simplifying Ajax-Style Web Development," Computer, vol. 39, no. S, pp. 98-101, May, 2006.
-
-
-
-
4
-
-
77953069969
-
Abstracting Application-Level Web Security
-
World Wide Web, Honolulu, Hawaii, May 17-22
-
[4]Scott, D., Sharp, R. "Abstracting Application-Level Web Security." In: Proc. 1 11th Int'l Conf. World Wide Web (WWW2002), pages 396-407, Honolulu, Hawaii, May 17-22, 2002.
-
(2002)
Proc. 1 11th Int'l Conf
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
5
-
-
0036870155
-
Developing Secure Web Applications. IEEEInternet
-
Nov
-
Scott, D., Sharp, R. "Developing Secure Web Applications." IEEEInternet Computing, 6(6), 38-45, Nov 2002.
-
(2002)
Computing
, vol.6
, Issue.6
, pp. 38-45
-
-
Scott, D.1
Sharp, R.2
-
6
-
-
16244394407
-
Bulletproof Web Security
-
TechTarget Storage Media, May, last accessed Dec 10
-
[6]Bobbitt, M. "Bulletproof Web Security." Network Security Magazine, TechTarget Storage Media, May 2002., http://infosecuritymag. techtargetcom/2002/may/bulletproof.shtml, last accessed Dec 10, 2006
-
(2002)
Network Security Magazine
-
-
Bobbitt, M.1
-
7
-
-
33751032654
-
Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks
-
In The , Pages:, April 23-27
-
[7]Engin Kirda, Christopher Kruegel, Giovanni Vigna, and Nenad Jovanovic "Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks" In The 21st ACM Symposium on Applied Computing (SAC 2006), Pages: 330 - 337, April 23-27, 2006.
-
(2006)
21st ACM Symposium on Applied Computing (SAC
, pp. 330-337
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
8
-
-
16244362392
-
-
Wes Masri, Andy Podgurski, David Leon, Detecting and Debugging Insecure Information Flows, issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
-
Wes Masri, Andy Podgurski, David Leon, "Detecting and Debugging Insecure Information Flows," issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
-
-
-
-
9
-
-
35148877726
-
-
Jeremiah Grossman ,WhfteHat Security founder and CTO, Presentation, Webcast, 'Top 10 Web Hack of 2006, http://www.whhehatsec.com/home/ resources/presentations/files/whiteha t_top_hacks_06_F.pdf, 17-Jan-2007, last accessed Feb 10th 2007.
-
[9]Jeremiah Grossman ,WhfteHat Security founder and CTO, Presentation, Webcast, 'Top 10 Web Hack of 2006", http://www.whhehatsec.com/home/ resources/presentations/files/whiteha t_top_hacks_06_F.pdf, 17-Jan-2007, last accessed Feb 10th 2007.
-
-
-
|