No Web Site Left Behind : Are We Making Web Security Only for the Elite ?
暂无分享,去创建一个
[1] Collin Jackson,et al. Robust defenses for cross-site request forgery , 2008, CCS.
[2] Helen J. Wang,et al. Subspace: secure cross-domain communication for web mashups , 2007, WWW '07.
[3] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.
[4] Carsten Maple,et al. UK security breach investigations report: an analysis of data compromise cases , 2010 .
[5] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[6] Paul C. van Oorschot,et al. SOMA: mutual approval for included content in web pages , 2008, CCS.
[7] M. Merkow,et al. 2010 CWE/SANS Top 25 Most Dangerous Programming Errors , 2010 .
[8] Paul C. van Oorschot,et al. The developer is the enemy , 2009, NSPW '08.