The official PGP user's guide
Role-Based Access Control Models
Computer
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
RBAC on the Web by Secure Cookies
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Secure attribute services on the web
Secure attribute services on the web
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
A secure workflow system for dynamic collaboration
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Developing Secure Web Applications
IEEE Internet Computing
X-Compass: An XML Agent for Supporting User Navigation on the Web
FQAS '02 Proceedings of the 5th International Conference on Flexible Query Answering Systems
The Work Concept RBAC Model for the Access Control of the Distributed Web Server Environment
WI '01 Proceedings of the First Asia-Pacific Conference on Web Intelligence: Research and Development
An Agent-Based Hierarchical Clustering Approach for E-commerce Environments
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Enhancing the Security of Cookies
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
A User Behavior-Based Agent for Improving Web Usage
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
The Design and Implementation of Improved Secure Cookies Based on Certificate
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Role-based access control on the web using LDAP
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
Proceedings of the 3rd ACM workshop on Digital rights management
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Dealing with semantic heterogeneity for improving web usage
Data & Knowledge Engineering - Special issue: ER 2004
Agents' roles in B2C e-commerce
AI Communications
An XML-based agent model for supporting user activities on the Web
Web Intelligence and Agent Systems
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
EC-XAMAS: SUPPORTING E-COMMERCE ACTIVITIES BY AN XML-BASED ADAPTIVE MULTI-AGENT SYSTEM
Applied Artificial Intelligence
Cookies: A deployment study and the testing implications
ACM Transactions on the Web (TWEB)
A semantic data validation service for web applications
Journal of Theoretical and Applied Electronic Commerce Research
Secure session management with cookies
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
An investigation of hotlinking and its countermeasures
Computer Communications
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
Integrative security management for web-based enterprise applications
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Trusted identity and session management using secure cookies
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Web application security gateway with java non-blocking IO
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
ACM Transactions on Internet Technology (TOIT)
SSO password-based multi-server authentication protocol
International Journal of Communication Networks and Distributed Systems
Authentication session migration
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Hi-index | 0.00 |
Web servers and browsers typically use cookies to capture information for subsequent communications, which provides continuity and state across HTTP connections. At present, Internet e-commerce is somewhat limited in using cookies because sensitive information cannot be securely stored and communicated in typical cookies. Secure cookies offer a potential solution to this problem