Academic literature on the topic 'Client-side Web Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Client-side Web Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Client-side Web Security"

1

Shahriar, Hossain, and Hisham M. Haddad. "Client-Side Detection of Clickjacking Attacks." International Journal of Information Security and Privacy 9, no. 1 (January 2015): 1–25. http://dx.doi.org/10.4018/ijisp.2015010101.

Full text
Abstract:
Clickjacking attacks are emerging threat for web application users where click operations performed by victims lead to security breaches such as compromising webcams and posting unintended messages. Effective client-side defense technique could prevent the possible victims. This paper presents a client side approach to detect clickjacking attacks. The authors' approach examines web page requests and responses; the proposed approach is designed to detect advanced attack types such as cursorjacking, double click, and history object-based attacks. They evaluate the proposed approach with a set of legitimate and malicious websites. The results indicate that our approach has low false positive and false negative rates. The overhead imposed by the proposed approach is negligible.
APA, Harvard, Vancouver, ISO, and other styles
2

., Archana B. Kadga. "IDENTITY BASED CRYPTOGRAPHY FOR CLIENT SIDE SECURITY IN WEB APPLICATIONS (WEBIBC)." International Journal of Research in Engineering and Technology 03, no. 15 (May 25, 2014): 181–86. http://dx.doi.org/10.15623/ijret.2014.0315034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shukla, Samiksha, D. K. Mishra, and Kapil Tiwari. "Performance Enhancement of Soap Via Multi Level Caching." Mapana - Journal of Sciences 9, no. 2 (November 30, 2010): 47–52. http://dx.doi.org/10.12723/mjs.17.6.

Full text
Abstract:
Due to complex infrastructure of web application response time for different service request by client requires significantly larger time. Simple Object Access Protocol (SOAP) is a recent and emerging technology in the field of web services, which aims at replacing traditional methods of remote communications. Basic aim of designing SOAP was to increase interoperability among broad range of programs and environment, SOAP allows applications from different languages, installed on different platforms to communicate with each other over the network. Web services demand security, high performance and extensibility. SOAP provides various benefits for interoperability but we need to pay price of performance degradation and security for that. This formulates SOAP a poor preference for high performance web services. In this paper we present a new approach by enabling multi-level caching at client side as well as server side. Reference describes implementation based on the Apache Java SOAP client, which gives radically enhanced performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Lesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (December 18, 2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.

Full text
Abstract:
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixing them. Therefore, the knowledge of the security developer is a key factor in building a secure Web resource. To resolve application security problems, developers must know all the ways and vectors of various attacks in order to be able to develop various protection mechanisms. This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. In XSS attacks, malicious content is delivered to users by means of a client-side programming language such as JavaScript, while using SQL injection, the SQL database query language is used. At the same time, XSS attacks, unlike SQL injections, harm only the client side leaving the application server operational. Developers should develop security for both server components and the client part of the web application.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Bing Qi, Hui Lan Jiang, and Jing Peng Wang. "Client-Side in Management System of Transmission Line Passage Protection Based on Android." Advanced Materials Research 986-987 (July 2014): 2139–42. http://dx.doi.org/10.4028/www.scientific.net/amr.986-987.2139.

Full text
Abstract:
To overcome the shortcoming of lack of real-time in traditional latent troubles information management, a transmission line passage protection system (TLPPS) Android client-side is developed in this paper. Basing on Android mobile’s real-time communication and good development performance, Android client is used to record the information of latent trouble. Web Service is adopted to realize the wireless communication between client and server, then the real-time upload and updating is realized, thus improving the accuracy and making it possible for the administrator to put up with the advice of dealing with the latent trouble in time. The security of power system is guaranteed.
APA, Harvard, Vancouver, ISO, and other styles
6

Hall, Calum, Lynsay Shepherd, and Natalie Coull. "BlackWatch: Increasing Attack Awareness within Web Applications." Future Internet 11, no. 2 (February 15, 2019): 44. http://dx.doi.org/10.3390/fi11020044.

Full text
Abstract:
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of security. While prevention is an essential part of the security process, developers must also implement a level of attack awareness into their web applications. Being able to detect when an attack is occurring provides applications with the ability to execute responses against malicious users in an attempt to slow down or deter their attacks. This research seeks to improve web application security by identifying malicious behavior from within the context of web applications using our tool BlackWatch. The tool is a Python-based application which analyzes suspicious events occurring within client web applications, with the objective of identifying malicious patterns of behavior. This approach avoids issues typically encountered with traditional web application firewalls. Based on the results from a preliminary study, BlackWatch was effective at detecting attacks from both authenticated and unauthenticated users. Furthermore, user tests with developers indicated BlackWatch was user-friendly, and was easy to integrate into existing applications. Future work seeks to develop the BlackWatch solution further for public release.
APA, Harvard, Vancouver, ISO, and other styles
7

Hossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (April 1, 2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.

Full text
Abstract:
Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most dangerous attack. There are a number of measures proposed to prevent SSL tripping-based session hijacking attacks. However, existing surveys did not summarize all the preventive measures in a comprehensive manner (without much illustration and categorization). The objective of this paper is to provide a comprehensive survey of existing measures against SSL stripping-based session hijacking attacks and compare those measures. In this paper, we have classified all the existing preventive measures for SSL stripping-based session hijacking attacks into two main categories: client-side measures and serverside measures. We have illustrated the proposed solutions comprehensively with useful diagrams for clarification. We have also compared them based on different performance criteria. This paper will help web security researchers to have a comparative analysis of all solutions for the SSL stripping based attacks, thereby improving existing solutions to better protect the users from session hijacking attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Cerny, Tomas, Miroslav Macik, Michael Donahoo, and Jan Janousek. "On distributed concern delivery in user interface design." Computer Science and Information Systems 12, no. 2 (2015): 655–81. http://dx.doi.org/10.2298/csis141202021c.

Full text
Abstract:
Increasing demands on user interface (UI) usability, adaptability, and dynamic behavior drives ever-growing development and maintenance complexity. Traditional UI design techniques result in complex descriptions for data presentations with significant information restatement. In addition, multiple concerns in UI development leads to descriptions that exhibit concern tangling, which results in high fragment replication. Concern-separating approaches address these issues; however, they fail to maintain the separation of concerns for execution tasks like rendering or UI delivery to clients. During the rendering process at the server side, the separation collapses into entangled concerns that are provided to clients. Such client-side entanglement may seem inconsequential since the clients are simply displaying what is sent to them; however, such entanglement compromises client performance as it results in problems such as replication, fragment granularity ill-suited for effective caching, etc. This paper considers advantages brought by concern-separation from both perspectives. It proposes extension to the aspect-oriented UI design with distributed concern delivery (DCD) for client-server applications. Such an extension lessens the serverside involvement in UI assembly and reduces the fragment replication in provided UI descriptions. The server provides clients with individual UI concerns, and they become partially responsible for the UI assembly. This change increases client-side concern reuse and extends caching opportunities, reducing the volume of transmitted information between client and server to improve UI responsiveness and performance. The underlying aspect-oriented UI design automates the server-side derivation of concerns related to data presentations adapted to runtime context, security, conditions, etc. Evaluation of the approach is considered in a case study applying DCD to an existing, production web application. Our results demonstrate decreased volumes of UI descriptions assembled by the server-side and extended client-side caching abilities, reducing required data/fragment transmission, which improves UI responsiveness. Furthermore, we evaluate the potential benefits of DCD integration implications in selected UI frameworks.
APA, Harvard, Vancouver, ISO, and other styles
9

Čepický, Jáchym, and Luís Moreira de Sousa. "New implementation of OGC Web Processing Service in Python programming language. PyWPS-4 and issues we are facing with processing of large raster data using OGC WPS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B7 (June 22, 2016): 927–30. http://dx.doi.org/10.5194/isprsarchives-xli-b7-927-2016.

Full text
Abstract:
The OGC® Web Processing Service (WPS) Interface Standard provides rules for standardizing inputs and outputs (requests and responses) for geospatial processing services, such as polygon overlay. The standard also defines how a client can request the execution of a process, and how the output from the process is handled. It defines an interface that facilitates publishing of geospatial processes and client discovery of processes and and binding to those processes into workflows. Data required by a WPS can be delivered across a network or they can be available at a server. <br><br> PyWPS was one of the first implementations of OGC WPS on the server side. It is written in the Python programming language and it tries to connect to all existing tools for geospatial data analysis, available on the Python platform. During the last two years, the PyWPS development team has written a new version (called PyWPS-4) completely from scratch. <br><br> The analysis of large raster datasets poses several technical issues in implementing the WPS standard. The data format has to be defined and validated on the server side and binary data have to be encoded using some numeric representation. Pulling raster data from remote servers introduces security risks, in addition, running several processes in parallel has to be possible, so that system resources are used efficiently while preserving security. Here we discuss these topics and illustrate some of the solutions adopted within the PyWPS implementation.
APA, Harvard, Vancouver, ISO, and other styles
10

Čepický, Jáchym, and Luís Moreira de Sousa. "New implementation of OGC Web Processing Service in Python programming language. PyWPS-4 and issues we are facing with processing of large raster data using OGC WPS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B7 (June 22, 2016): 927–30. http://dx.doi.org/10.5194/isprs-archives-xli-b7-927-2016.

Full text
Abstract:
The OGC® Web Processing Service (WPS) Interface Standard provides rules for standardizing inputs and outputs (requests and responses) for geospatial processing services, such as polygon overlay. The standard also defines how a client can request the execution of a process, and how the output from the process is handled. It defines an interface that facilitates publishing of geospatial processes and client discovery of processes and and binding to those processes into workflows. Data required by a WPS can be delivered across a network or they can be available at a server. <br><br> PyWPS was one of the first implementations of OGC WPS on the server side. It is written in the Python programming language and it tries to connect to all existing tools for geospatial data analysis, available on the Python platform. During the last two years, the PyWPS development team has written a new version (called PyWPS-4) completely from scratch. <br><br> The analysis of large raster datasets poses several technical issues in implementing the WPS standard. The data format has to be defined and validated on the server side and binary data have to be encoded using some numeric representation. Pulling raster data from remote servers introduces security risks, in addition, running several processes in parallel has to be possible, so that system resources are used efficiently while preserving security. Here we discuss these topics and illustrate some of the solutions adopted within the PyWPS implementation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Client-side Web Security"

1

Prabhakara, Deepak. "Web Applications Security : A security model for client-side web applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8962.

Full text
Abstract:

The Web has evolved to support sophisticated web applications. These web applications are exposed to a number of attacks and vulnerabilities. The existing security model is unable to cope with these increasing attacks and there is a need for a new security model that not only provides the required security but also supports recent advances like AJAX and mashups. The attacks on client-side Web Applications can be attributed to four main reasons – 1) lack of a security context for Web Browsers to take decisions on the legitimacy of requests, 2) inadequate JavaScript security, 3) lack of a Network Access Control and 4) lack of security in Cross-Domain Web Applications. This work explores these four reasons and proposes a new security model that attempts to improve overall security for Web Applications. The proposed security model allows developers of Web Applications to define fine-grained security policies and Web Browsers enforce these rules; analogous to a configurable firewall for each Web Application. The Browser has disallows all unauthorized requests, thus preventing most common attacks like Cross-Site Script Injections, Cross-Frame Scripting and Cross-Site Tracing. In addition the security model defines a framework for secure Cross-Domain Communication, thus allowing secure mashups of Web Services. The security model is backward compatible, does not affect the current usability of the Web Applications and has cross-platform applicability. The proposed security model was proven to protect against most common attacks, by a proof-of-concept implementation that was tested against a comprehensive list of known attacks.

APA, Harvard, Vancouver, ISO, and other styles
2

Johnson, Ludwig, and Lukas Mårtensson. "Assessing HTTP Security Header implementations : A study of Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21725.

Full text
Abstract:
Background. Security on the web is a fundamental requirement as it becomes a bigger part of society and more information than ever is shared over it. However, as recent incidents have shown, even Swedish government agencies have had issues with their website security. One such example is when a client-side supply chain for several governmental websites was hacked and malicious javascript was subsequently found on several governmental websites. Hence this study is aimed at assessing the security of Swedish government agencies’ first line of defense against attacks like XSS and client-side supply chain. Objectives. The main objective of the thesis is to assess the first line of defense, namely HTTP security headers, of Swedish government agency websites. In addition, collecting statistics of what HTTP security headers are actually used by Swedish government agencies today were gathered for comparison with similar studies. Methods. To fulfill the objectives of the thesis, a scan of all Swedish government agency websites, found on Myndighetsregistret, was completed and an algorithm was developed to assess the implementation of the security features. In order to facilitate tunable assessments for different types of websites, the algorithm has granular weights that can be assigned to each test to make the algorithm more generalized. Results. The results show a low overall implementation rate of the various HTTP security headers among the Swedish government agency websites. However, when compared to similar studies, the adoption of all security features are higher among the Swedish government agency websites tested in this thesis. Conclusions. Previous tools/studies mostly checked if a header was implemented or not. With our algorithm, the strength of the security header implementation is also assessed. According to our results, there is a significant difference between if a security header has been implemented, and if it has been implemented well, and provides adequate security. Therefore, traditional tools for testing HTTP security headers may be inefficient and misleading.
APA, Harvard, Vancouver, ISO, and other styles
3

Strålberg, Linda. "Prevention of Input Validation Vulnerabilities on the Client-Side : A Comparison Between Validating in AngularJS and React Applications." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17346.

Full text
Abstract:
The aim of this research was to test the JavaScript library React and framework AngularJS against each other in regard of the response time of the validation and validation robustness. The experiments in this work were performed to support developers in their decision making regarding which library or framework to use. There are many other aspects to consider when choosing which library or framework to develop in other than the security and response time related aspects mentioned in this work, but this work can, amongst other information, give yet another viewpoint to the developers. The results showed that there is no difference amongst them security wise, but that it was somewhat faster to validate in a React application than in an AngularJS application.
APA, Harvard, Vancouver, ISO, and other styles
4

Yeh, Pei-Ling, and 葉姵伶. "A System of Web Browsing Security for Client-side Users." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/32116802820392013232.

Full text
Abstract:
碩士
銘傳大學
資訊傳播工程學系碩士班
98
Security problems with Web Applications are increasing with the growth of Internet applications. Most of web security systems focus on web servers and applications by protecting the intrusion form attackers or analyzing the source codes of applications. However, most of web sites are not secure and there are lots of malicious sites created by hackers. Web browsing on the client-site is not safe. In this paper, we focus on the security of web browsing for client-side users by examining the content of HTTP packets. Proxy/ICAP servers and the toolbar of the browser are used as the analysis engine. An interactive interface is designed to collect user feedback to provide information for analysis. Our solution is able to provide a safe web browsing environment for people, and thus improve the network security.
APA, Harvard, Vancouver, ISO, and other styles
5

Sayed, Bassam. "Protection against malicious JavaScript using hybrid flow-sensitive information flow monitoring." Thesis, 2015. http://hdl.handle.net/1828/7063.

Full text
Abstract:
Modern web applications use several third-party JavaScript libraries to achieve higher levels of engagement. The third-party libraries range from utility libraries such as jQuery to libraries that provide services such as Google Analytics and context- sensitive advertisement. These third-party libraries have access to most (if not all) the elements of the displayed webpage. This allows malicious third-party libraries to perform attacks that steal information from the end-user or perform an action without the end-user consent. These types of attacks are the stealthiest and the hardest to defend against, because they are agnostic to the browser type and platform of the end-user and at the same time they rely on web standards when performing the attacks. Such kind of attacks can perform actions using the victim’s browser without her permission. The nature of such actions can range from posting an embarrassing message on the victim’s behalf over her social network account, to performing online biding using the victim’s account. This poses the need to develop effective mechanisms for protecting against client-side web attacks that mainly target the end-user. In the proposed research, we address the above challenges from information flow monitoring perspective by developing a framework that restricts the flow of information on the client-side to legitimate channels. The proposed model tracks sensitive information flow in the JavaScript code and prevents information leakage from happening. The main component of the framework is a hybrid flow-sensitive security monitor that controls, at runtime, the dissemination of information flow and its inlining. The security monitor is hybrid as it combines both static analysis and runtime monitoring of the running JavaScript program. We provide the soundness proof of the model with respect to termination-insensitive non-interference security policy and develop a new security benchmark to establish experimentally its effectiveness in detecting and preventing illicit information flow. When applied to the context of client-side web-based attacks, the proposed model provides a more secure browsing environment for the end-user.
Graduate
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Client-side Web Security"

1

De Ryck, Philippe, Lieven Desmet, Frank Piessens, and Martin Johns. Primer on Client-Side Web Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Client-side Web Security"

1

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "Improving Client-Side Web Security." In Primer on Client-Side Web Security, 105–11. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "How Attackers Threaten the Web." In Primer on Client-Side Web Security, 33–42. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "Attacks on the Client-Side Context." In Primer on Client-Side Web Security, 83–94. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "Attacks on the Client Device." In Primer on Client-Side Web Security, 95–103. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "The Relevance of Client-Side Web Security." In Primer on Client-Side Web Security, 1–9. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "Traditional Building Blocks of the Web." In Primer on Client-Side Web Security, 11–24. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "The Browser as a Platform." In Primer on Client-Side Web Security, 25–32. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "Attacks on the Network." In Primer on Client-Side Web Security, 43–55. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "Attacks on the Browser’s Requests." In Primer on Client-Side Web Security, 57–68. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ryck, Philippe De, Lieven Desmet, Frank Piessens, and Martin Johns. "Attacks on the User’s Session." In Primer on Client-Side Web Security, 69–82. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12226-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Client-side Web Security"

1

Skrupsky, Nazari, Maliheh Monshizadeh, Prithvi Bisht, Timothy Hinrichs, V. N. Venkatakrishnan, and Lenore Zuck. "WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications." In 2012 International Conference on Cyber Security (CyberSecurity). IEEE, 2012. http://dx.doi.org/10.1109/cybersecurity.2012.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guan, Zhi, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, and Xianghao Nan. "WebIBC: Identity Based Cryptography for Client Side Security in Web Applications." In 2008 28th IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE, 2008. http://dx.doi.org/10.1109/icdcs.2008.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johns, Martin, and Alexandra Dirksen. "Towards Enabling Secure Web-Based Cloud Services using Client-Side Encryption." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411495.3421364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ghafari, Mohammad, Hamid Shoja, and Mohammad Yosef Amirani. "Detection and Prevention of Data Manipulation from Client Side in Web Applications." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Ping, Lieven Desmet, Christophe Huygens, and Wouter Joosen. "Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web." In the 25th International Conference Companion. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2872518.2888605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Clutterbuck, Peter. "Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications." In 2010 IEEE 10th International Conference on Computer and Information Technology (CIT). IEEE, 2010. http://dx.doi.org/10.1109/cit.2010.161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pliutau, Denis, and Narasimha S. Prasad. "Usage of data-encoded web maps with client side color rendering for combined data access, visualization, and modeling purposes." In SPIE Defense, Security, and Sensing, edited by Matthew F. Pellechia, Richard J. Sorensen, and Kannappan Palaniappan. SPIE, 2013. http://dx.doi.org/10.1117/12.2016325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scholand, Andrew J., Russell S. Peak, and Robert E. Fulton. "Enabling Distributed Data Processing for Internet Analysis With GenX." In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/cie-9076.

Full text
Abstract:
Abstract This paper describes how an XML mapping of a product neutral standard, GenCAMsm, has been used in combination with a JavaScript XML parser to enable product-data driven analysis from a web interface. This client side processing of detailed design data results in greater accuracy of analysis inputs, lower Internet bandwidth requirements, and greater intellectual property security. The web interface lowers the barriers to use of sophisticated CAE analysis software, enabling tool use by product and process experts throughout the supply chain. An example illustration based on a Plated Through Hole thermomechanical analysis is presented. Application to an Internet-based Engineering Service Bureau is discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography