No boundaries: data exfiltration by third parties embedded on web pages

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Embedded Objects in Web Pages

An important characteristic of a Web page|the number of objects embedded in it|is di cult to obtain using publicly available sources of Web characterization data, such as proxy and server traces. It is important, however, to have an estimate for the number of embedded objects found in Web pages for modeling of realistic Web sites and workloads. We analyzed two data sets collected using active m...

متن کامل

Analysing Structured Scholarly Data Embedded in Web Pages

Web pages increasingly embed structured data in the form of microdata, microformats and RDFa. Through efforts such as schema.org, such embedded markup have become prevalent, with current studies estimating an adoption by about 26% of all web pages. Similar to the early adoption of Linked Data principles by publishers, libraries and other providers of bibliographic data, such organisations have ...

متن کامل

A Thin-Server Approach to Ephemeral Web Personalization Exploiting RDF Data Embedded in Web Pages

Over the last years adaptive Web personalization has become a widespread service and all the major players of the WWW are providing it in various forms. Ephemeral personalization, in particular, deals with short time interests which are often tacitly entailed from user browsing behaviour or contextual information. Such personalization can be found almost anywhere in the Web in several forms, ra...

متن کامل

Web Authentication using Third-Parties in Untrusted Environments

With the increasing personalization of the Web, many websites allow users to create their own personal accounts. This has resulted in Web users often having many accounts on different websites, to which they need to authenticate in order to gain access. Unfortunately, there are several security problems connected to the use and re-use of passwords, the most prevalent authentication method curre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2020

ISSN: 2299-0984

DOI: 10.2478/popets-2020-0070