Sign in

Object Capabilities and Isolation of Untrusted Web Applications.

Sergio MaffeisJohn C. MitchellAnkur Taly
Published in: IEEE Symposium on Security and Privacy (2010)
Keyphrases
  • web applications
  • application development
  • web services
  • end users
  • application developers
  • web browser
  • web application development
  • business applications
  • third party
  • data objects
  • database
  • databases
  • flow diagram