License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.09141.2
URN: urn:nbn:de:0030-drops-27258
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2010/2725/
Go to the corresponding Portal


Boneh, Dan ; Erlingsson, Ulfar ; Johns, Martin ; Livshits, Benjamin

09141 Executive Summary -- Web Application Security

pdf-format:
dagstuhl_proceedings.2725.pdf (0.2 MB)


Abstract

Web applications are ubiquitous nowadays. Consequently,
the field of Web application security is of ever rising significance. This
Dagstuhl seminar was conducted to assemble researchers active in the
domain to gain a first comprehensive overview of this young discipline in
security research. From a content perspective, the topic was explored in a
great variety of directions, including for instance Web browser-based security
measures, language-based techniques, software engineering centric
methods, run-time enforcement, static analysis, or formal approaches.

BibTeX - Entry

@InProceedings{boneh_et_al:DagSemProc.09141.2,
  author =	{Boneh, Dan and Erlingsson, Ulfar and Johns, Martin and Livshits, Benjamin},
  title =	{{09141 Executive Summary – Web Application Security}},
  booktitle =	{Web Application Security},
  pages =	{1--11},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{9141},
  editor =	{Dan Boneh and Ulfar Erlingsson and Martin Johns and Benjamin Livshits},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2010/2725},
  URN =		{urn:nbn:de:0030-drops-27258},
  doi =		{10.4230/DagSemProc.09141.2},
  annote =	{Keywords: Web applications, Security, Ajax, Web 2.0, Analysis for security, Browser design, Distributed applications}
}

Keywords: Web applications, Security, Ajax, Web 2.0, Analysis for security, Browser design, Distributed applications
Collection: 09141 - Web Application Security
Issue Date: 2010
Date of publication: 13.08.2010


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI