메뉴 건너뛰기




Volumn , Issue , 2010, Pages 721-730

Object views: Fine-grained sharing in browsers

Author keywords

aspect; browser; ecmascript; javascript; membrane; reference monitor; remote object; same origin policy; web security; wrapper

Indexed keywords

ASPECT; JAVASCRIPT; REFERENCE MONITORS; REMOTE OBJECT; SAME-ORIGIN POLICY; WEB SECURITY;

EID: 77954593323     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1772690.1772764     Document Type: Conference Paper
Times cited : (24)

References (31)
  • 6
    • 0346863419 scopus 로고
    • Back to Direct Style
    • London, UK, Springer-Verlag
    • O. Danvy. Back to Direct Style. In 4th European Symposium on Programming, pages 130-150, London, UK, 1992. Springer-Verlag.
    • (1992) 4th European Symposium on Programming , pp. 130-150
    • Danvy, O.1
  • 7
    • 77954570716 scopus 로고    scopus 로고
    • weak references
    • ECMAScript Wiki. weak references. http://wiki.ecmascript.org/doku.php?id= strawman:weak-references.
    • ECMAScript Wiki
  • 13
    • 84890883068 scopus 로고    scopus 로고
    • Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code
    • S. Guarnieri and B. Livshits. Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. In USENIX Security Symposium, Aug. 2009.
    • USENIX Security Symposium, Aug. 2009
    • Guarnieri, S.1    Livshits, B.2
  • 17
    • 77954584360 scopus 로고    scopus 로고
    • S. Isaacs and D. Manolescu. WebSandbox - Microsoft Live Labs. http://websandbox.livelabs.com/, 2009.
    • (2009)
    • Isaacs, S.1    Manolescu, D.2
  • 18
    • 35348860223 scopus 로고    scopus 로고
    • Defeating Script Injection Attacks with Browser-Enforced Embedded Policies
    • New York, NY, USA, ACM
    • T. Jim, N. Swamy, and M. Hicks. Defeating Script Injection Attacks with Browser-Enforced Embedded Policies. In 16th International Conference on World Wide Web, pages 601-610, New York, NY, USA, 2007. ACM.
    • (2007) 16th International Conference on World Wide Web , pp. 601-610
    • Jim, T.1    Swamy, N.2    Hicks, M.3
  • 19
    • 0000713886 scopus 로고    scopus 로고
    • Aspect-Oriented Programming
    • G. Kiczales. Aspect-Oriented Programming. ACM Computer Survey, page 154, 1996.
    • (1996) ACM Computer Survey , pp. 154
    • Kiczales, G.1
  • 21
    • 70350525212 scopus 로고    scopus 로고
    • Language-based Isolation of Untrusted Javascript
    • See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3
    • S. Maffeis and A. Taly. Language-based Isolation of Untrusted Javascript. In IEEE Computer Security Foundations Symposium, 2009. See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009.
    • (2009) IEEE Computer Security Foundations Symposium, 2009
    • Maffeis, S.1    Taly, A.2
  • 24
    • 84939610342 scopus 로고    scopus 로고
    • Delegating Responsibility in Digital Systems: Horton's "who done it?"
    • Berkeley, CA, USA, USENIX Association
    • M. S. Miller, J. E. Donnelley, and A. H. Karp. Delegating Responsibility in Digital Systems: Horton's "who done it?". In 2nd USENIX Workshop on Hot topics in Security, pages 1-5, Berkeley, CA, USA, 2007. USENIX Association.
    • (2007) 2nd USENIX Workshop on Hot Topics in Security , pp. 1-5
    • Miller, M.S.1    Donnelley, J.E.2    Karp, A.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.