Proceedings of the 21st International Conference on World Wide Web 2012
DOI: 10.1145/2187836.2187944
|View full text |Cite
|
Sign up to set email alerts
|

SAFE extensibility of data-driven web applications

Abstract: This paper presents a novel method for enabling fast development and easy customization of interactive data-intensive web applications. Our approach is based on a high-level hierarchical programming model that results in both a very clean semantics of the application while at the same time creating well-defined interfaces for customization of application components. A prototypical implementation of a conference management system shows the efficacy of our approach.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…This section recaps the main features of the SAFE framework [1,2] for the development of secure Web applications with automatic state consistency and safe extensibility. SAFE provides a hierarchical programming model which naturally builds upon the hierarchical DOM structure of Web pages.…”
Section: Safementioning
confidence: 99%
“…This section recaps the main features of the SAFE framework [1,2] for the development of secure Web applications with automatic state consistency and safe extensibility. SAFE provides a hierarchical programming model which naturally builds upon the hierarchical DOM structure of Web pages.…”
Section: Safementioning
confidence: 99%
“…More akin with the OP vision is SAFE [13] an architecture of Web Application extensibility aimed at permitting users to personalize websites. SAFE is based on a hierarchical programming model based on f-units (the component model).…”
Section: Related Workmentioning
confidence: 99%
“…Today's Web 2.0 users wish to personalize their devices and applications -from minorly invasive customizations (such as changing the visual appearance) to functionality-extending changes that constitute true forms of extensibility. Not only smartphones, tablets, and browsers are in focus of personalization, but also existing RIAs should be customizable -and even extensible -in previously unforeseen directions [3,31,12,34,15,18,22,17].…”
Section: Introductionmentioning
confidence: 99%
“…(C3) Implementation. We have implemented our new extensibility mechanisms in [31], which is a suitable choice for our methodologies since the framework originally laid the foundation for subsequent extensions towards secure extensibility. However, the existing extensibility mechanisms had some architectural drawbacks, e.g., all application data was globally managed by a centralized and trusted entity that enforces access control policies over the data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation