JSONRequest / Google / MySpace / Yahoo / Microsoft / SPI Labs / NebuAd / / /
IndustryTerm
web program instance / untrusted web programs / web program instances / boundaries separating web programs / origin server / Cross-site / Web Applications / Web content / hazardous web / web document / trusted web program / public key infrastructure / adversarial web programs / untrusted helper applications / Web Program Instance Web Program Instance / web browsers / potential solution / web browsing / Web Programs Today / Web Privacy Attacks / web browser / web program behavior / malicious web programs / Web Application Security / given web program / Web Privacy / point solutions / web program / web security threats / social networking services / runtime environment / web program code / untrusted web / web developers / bank / web programs / Web Programs Charles Reis / Web Resources / auction site / web server / malicious web program / mashup web programs / /
Organization
Computer Science and Engineering University of Washington Abstract / Science Foundation / Department of Computer Science / /
Person
C. Jackson / Henry M. Levy / D. Schroeder / J. Howell / Steven D. Gribble / /
Position
Vulnerability-Driven Slivka Chair / program author / /
ProgrammingLanguage
Java / HTML / php / JavaScript / /
PublishedMedium
the National / Communications of the ACM / /
Technology
LAN / public key infrastructure / JSON / private key / operating system / HTML / operating systems / Ajax / public key / DNS / Java / DHTML / HTTP / DOM / Document Object Model / Flash / web server / /