End-to-End Security of Information Flow in Web-based Applications

Web-based applications and services are increasingly being used in security-sensitive tasks. Current security protocols rely on two crucial assumptions to protect the confidentiality and integrity of information: First, they assume that end-point software used to handle security-sensitive informati...

Full description

Bibliographic Details
Main Author: Singaravelu, Lenin
Published: Georgia Institute of Technology 2007
Subjects:
Online Access:http://hdl.handle.net/1853/16142