The new hacker's dictionary (3rd ed.)
The new hacker's dictionary (3rd ed.)
Database nation
ACM Transactions on Internet Technology (TOIT)
Disclosing users' data in an environment that preserves privacy
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Cookies on-the-move: managing cookies on a smart card
Proceedings of the 2004 ACM symposium on Applied computing
An embedded domain-specific language for type-safe server-side web scripting
ACM Transactions on Internet Technology (TOIT)
Mining interesting knowledge from weblogs: a survey
Data & Knowledge Engineering
Mobile cookies management on a smart card
Communications of the ACM
An examination of user perception and misconception of internet cookies
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Tracking the changes of dynamic web pages in the existence of URL rewriting
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
Cookies: A deployment study and the testing implications
ACM Transactions on the Web (TWEB)
Secure session management with cookies
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
An automatic HTTP cookie management system
Computer Networks: The International Journal of Computer and Telecommunications Networking
On how ants put advertisements on the web
IEA/AIE'10 Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part II
A survey of cookie technology adoption amongst nations
Journal of Web Engineering
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
Fortifying web-based applications automatically
Proceedings of the 18th ACM conference on Computer and communications security
Towards Semantics-Based Instantiation of Services
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Source attribution for network address translated forensic captures
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Developing secure web applications
International Journal of Internet Technology and Secured Transactions
POCKET: A tool for protecting children's privacy online
Decision Support Systems
Automated cookie collection testing
ACM Transactions on Software Engineering and Methodology (TOSEM)
Contextual integrity's decision heuristic and the tracking by social network sites
Ethics and Information Technology
Hi-index | 0.02 |
How did we get from a world where cookies were something you ate and where "nontechies" were unaware of "Netscape cookies" to a world where cookies are a hot-button privacy issue for many computer users? This article describes how HTTP "cookies" work and how Netscape's original specification evolved into an IETF Proposed Standard. I also offer a personal perspective on how what began as a straightforward technical specification turned into a political flashpoint when it tried to address nontechnical issues such as privacy.