End-to-End Security of Information Flow in Web-based Applications
Web-based applications and services are increasingly being used in security-sensitive tasks. Current security protocols rely on two crucial assumptions to protect the confidentiality and integrity of information: First, they assume that end-point software used to handle security-sensitive informati...
Main Author: | |
---|---|
Published: |
Georgia Institute of Technology
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/16142 |