Adam Barth

According to our database1, Adam Barth authored at least 28 papers between 2004 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
HTTP Strict Transport Security (HSTS).
RFC, November, 2012

A Learning-Based Approach to Reactive Security.
IEEE Trans. Dependable Secur. Comput., 2012

2011
The Web Origin Concept.
RFC, December, 2011

HTTP State Management Mechanism.
RFC, April, 2011

How Open Should Open Source Be?
CoRR, 2011

Towards Client-side HTML Security Policies.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

App isolation: get the security of multiple browsers with just one.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Regular expressions considered harmful in client-side XSS filters.
Proceedings of the 19th International Conference on World Wide Web, 2010

Preventing Capability Leaks in Secure JavaScript Subsets.
Proceedings of the Network and Distributed System Security Symposium, 2010

Protecting Browsers from Extension Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2010

Towards a Formal Foundation of Web Security.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Protecting browsers from DNS rebinding attacks.
ACM Trans. Web, 2009

Browser security: lessons from Google Chrome.
Commun. ACM, 2009

Securing frame communication in browsers.
Commun. ACM, 2009

Rootkits for JavaScript Environments.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense.
Proceedings of the 18th USENIX Security Symposium, 2009

Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Design and analysis of privacy policies.
PhD thesis, 2008

Forcehttps: protecting high-security web sites from network attacks.
Proceedings of the 17th International Conference on World Wide Web, 2008

Robust defenses for cross-site request forgery.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.
Proceedings of the Financial Cryptography and Data Security, 2007

Privacy and Utility in Business Processes.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Privacy and Contextual Integrity: Framework and Applications.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Managing Digital Rights using Linear Logic.
Proceedings of the 21th IEEE Symposium on Logic in Computer Science (LICS 2006), 2006

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
High performance imaging using large camera arrays.
ACM Trans. Graph., 2005

Enterprise privacy promises and enforcement.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

2004
Conflict and combination in privacy policy languages.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004


  Loading...