World wide web security

被引:0
|
作者
Lipp, P [1 ]
机构
[1] Graz Univ Technol, IAIK, A-8010 Graz, Austria
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes security problems within the World Wide Web and discusses SSL and digital signatures for XML as possible solutions for some of these problems.
引用
收藏
页码:169 / 182
页数:14
相关论文
共 50 条
  • [1] Security and the World Wide Web
    Thuraisingham, B
    [J]. TWENTY-SECOND ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE - PROCEEDINGS, 1998, : 260 - 260
  • [2] Managing data security on the World Wide Web
    Dauerer, NJ
    Kelley, EE
    [J]. 1977 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 1997, : 539 - 545
  • [3] Security of World Wide Web search engines
    Marchiori, M
    [J]. RELIABILITY, QUALITY AND SAFETY OF SOFTWARE-INTENSIVE SYSTEMS, 1997, : 161 - 174
  • [4] Panel: Security and the World-Wide Web
    Treese, W
    [J]. 1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 109 - 109
  • [5] Combining World Wide Web and wireless security
    Claessens, J
    Preneel, B
    Vandewalle, J
    [J]. ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 153 - 171
  • [6] Network system and World Wide Web security
    Soh, BC
    Young, S
    [J]. COMPUTER COMMUNICATIONS, 1998, 20 (16) : 1431 - 1436
  • [7] Web Applications Security Assessment in the Portuguese World Wide Web Panorama
    Teodoro, Nuno
    Serrao, Carlos
    [J]. WEB APPLICATION SECURITY, 2010, 72 : 63 - 73
  • [8] Perceived security and World Wide Web purchase intention
    Salisbury, WD
    Pearson, RA
    Pearson, AW
    Miller, DW
    [J]. INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2001, 101 (3-4) : 165 - 176
  • [9] A Study: Enhancing Security of Anonymity Communication on the World Wide Web
    Ramadhani, Erika
    Luthfi, Ahmad
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (01) : 616 - 620
  • [10] Addressing threats and security issues in World Wide Web technology
    Gritzalis, S
    Spinellis, D
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 33 - 46