Proceedings of the First ACM Conference on Data and Application Security and Privacy 2011
DOI: 10.1145/1943513.1943526
|View full text |Cite
|
Sign up to set email alerts
|

Distributed data usage control for web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 33 publications
(34 citation statements)
references
References 20 publications
0
34
0
Order By: Relevance
“…While we do not claim that our system cannot be circumvented, we have some confidence that a reasonable level of security can be attained [25,10]. Performance-wise, we currently are faced with an overhead of one to two orders of magnitude [3,4].…”
Section: Discussionmentioning
confidence: 95%
See 4 more Smart Citations
“…While we do not claim that our system cannot be circumvented, we have some confidence that a reasonable level of security can be attained [25,10]. Performance-wise, we currently are faced with an overhead of one to two orders of magnitude [3,4].…”
Section: Discussionmentioning
confidence: 95%
“…An example policy we can enforce is presented in Appendix B.2. Web Browser: Firefox A third instance of our model at the browser level extends an existing usage control extension for the Firefox web browser [25]. In this scenario, we want to protect sensitive web page content from malicious usage by the user of the browser.…”
Section: Instantiationsmentioning
confidence: 99%
See 3 more Smart Citations