Web

A New Form of Web-Citizenship provides a much-needed analytical account of the implications of interactive participation in the construction of web content.

LONG-TERM TIME-STAMPING SERVICES

Time-stamping services produce time-stamp tokens as evidence to prove that digital data existed at given points in time. Time-stamp tokens contain verifiable…

Read More »

CYBER SECURITY LOOKUPS

BUILDING BLOCKS HYPERTEXT TRANSFER PROTOCOL – TRANSPORTATIONHYPERTEXT MARKUP LANGUAGE – REPRESENTATIONCASCADING STYLE SHEETS – BEAUTIFICATIONJAVASCRIPT – MODIFICATIONCROSS-DOMAIN COMMUNICATIONSAME-ORIGIN POLICYCROSS-ORIGIN RESOURCE…

Read More »

CROSS-SITE SCRIPTING PROTECTION

Web applications are becoming the dominant way to provide access to online services. At the same time, web application vulnerabilities are…

Read More »

MALICIOUS USE OF KEYS

MALICIOUS USE OF KEYS VIA CONTENT-ONLY ATTACKS FRAMESETS AND SSL If server SA offers a frameset over server-side SSL but…

Read More »

HISTORICAL VULNERABILITIES IN STEALING KEYS

Since the private key is not password-protected, an attacker can use the private key of the account’s owner at will…

Read More »

KEYJACKING: THE SURPRISING INSECURITY OF CLIENT-SIDE SSL

Currently, the Web is the dominant paradigm for information services. Typically, the browser issues a request to a server and the server…

Read More »

SECURE SHELL (SSH) PROTOCOLS

A variety of popular tools that allow access to remote hosts (such as telnet, rsh, and rlogin) or that provide…

Read More »

SECURE SSL NETWORK PROTOCOLS

The idea of secure network protocols is to create an additional layer between the application and the transport/network layer to provide…

Read More »

WEB ATTACK AND INTRUSION DETECTION

Web Attack detection assumes that an attacker can obtain access to his desired targets and is successful in violating a given security…

Read More »

MODERN WEB CRYPTOGRAPHY AND CIPHERTEXT

Security mechanisms in this category assume that an intruder may access the desired resource but the information is modified in a…

Read More »
Back to top button