Academic literature on the topic 'Web extensions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web extensions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Web extensions"

1

Picazo-Sanchez, Pablo, Juan Tapiador, and Gerardo Schneider. "After you, please: browser extensions order attacks and countermeasures." International Journal of Information Security 19, no. 6 (November 21, 2019): 623–38. http://dx.doi.org/10.1007/s10207-019-00481-8.

Full text
Abstract:
AbstractBrowser extensions are small applications executed in the browser context that provide additional capabilities and enrich the user experience while surfing the web. The acceptance of extensions in current browsers is unquestionable. For instance, Chrome’s official extension repository has more than 63,000 extensions, with some of them having more than 10M users. When installed, extensions are pushed into an internal queue within the browser. The order in which each extension executes depends on a number of factors, including their relative installation times. In this paper, we demonstrate how this order can be exploited by an unprivileged malicious extension (i.e., one with no more permissions than those already assigned when accessing web content) to get access to any private information that other extensions have previously introduced. We propose a solution that does not require modifying the core browser engine, since it is implemented as another browser extension. We prove that our approach effectively protects the user against usual attackers (i.e., any other installed extension) as well as against strong attackers having access to the effects of all installed extensions (i.e., knowing who did what). We also prove soundness and robustness of our approach under reasonable assumptions.
APA, Harvard, Vancouver, ISO, and other styles
2

Tarkiainen, Anssi, Hanna‐Kaisa Ellonen, and Olli Kuivalainen. "Complementing consumer magazine brands with internet extensions?" Internet Research 19, no. 4 (August 14, 2009): 408–24. http://dx.doi.org/10.1108/10662240910981371.

Full text
Abstract:
PurposeThe purpose of this paper is to increase understanding of the effects of web site extension on the parent‐magazine brand in the context of experiential goods, and to identify factors that are related to success.Design/methodology/approachThe paper focuses on the relationship between consumers' experiences on magazine web sites and their loyalty towards the print magazine.FindingsThere are different ways in which the web site can complement the print version. The first mechanism is related to engaging in more frequent communication with the magazine's readers, and the second is related to consumer‐initiated interaction between other readers. In both cases something is offered that cannot be obtained from the print magazine, but is assumed to complement it.Originality/valueThe paper increases understanding of brand extensions with regard to experiential goods, but more research is needed on the factors that are related to extension success.
APA, Harvard, Vancouver, ISO, and other styles
3

Ter Louw, Mike, Jin Soon Lim, and V. N. Venkatakrishnan. "Enhancing web browser security against malware extensions." Journal in Computer Virology 4, no. 3 (January 12, 2008): 179–95. http://dx.doi.org/10.1007/s11416-007-0078-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marwaha, Preeti, Hema Banati, and Punam Bedi. "UDDI Extensions for Temporally Customized Web Services." Procedia Technology 10 (2013): 184–90. http://dx.doi.org/10.1016/j.protcy.2013.12.351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

AUGENBROE, GODFRIED, HANS VERHEIJ, and GERHARD SCHWARZMÜLLER. "Project web sites with design management extensions." Engineering, Construction and Architectural Management 9, no. 3 (March 2002): 259–71. http://dx.doi.org/10.1108/eb021221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Martin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch, and Hailin Wu. "The privacy practices of Web browser extensions." Communications of the ACM 44, no. 2 (February 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Walsh, Patrick, and Antonio Williams. "To Extend or Not Extend a Human Brand: An Analysis of Perceived Fit and Attitudes Toward Athlete Brand Extensions." Journal of Sport Management 31, no. 1 (January 2017): 44–60. http://dx.doi.org/10.1123/jsm.2015-0314.

Full text
Abstract:
While athletes have been building and leveraging their brands for many years by introducing brand extensions, research on sport brand extensions has primarily focused on factors that influence the success of team-related extensions. However, as there is potential risk involved when introducing brand extensions, it is important for athletes to understand how consumers respond to extensions they may introduce. Through the use of self-administered web-based surveys this study provides the initial examination of this topic by exposing participants (n = 292) to hypothetical brand extensions and investigating factors that may influence perceived fit and attitudes toward athlete brand extensions. Partial least squares path modeling suggests that athlete prestige had the most significant effect on fit and attitudes for a brand extension that is considered to be a fit with an athlete’s image, while athlete attachment had the most influence on fit and attitudes for a brand extension with low perceived fit.
APA, Harvard, Vancouver, ISO, and other styles
8

De Sarkar, Tanmay. "The prevalence of web browser extensions use in library services: an exploratory study." Electronic Library 33, no. 3 (June 1, 2015): 334–54. http://dx.doi.org/10.1108/el-04-2013-0063.

Full text
Abstract:
Purpose – The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the features, purposes of use and types of browser extensions prevalent among libraries in different regions, the paper seeks to measure the degree of implementation of browser extensions. Design/methodology/approach – Stratified sampling method was followed to select academic libraries, and convenient sampling method was applied to select public libraries from four continents – Asia, Oceania, Europe and North America. Two-step web content analysis was applied to gather data along the select dimensions. Findings – The study contributes to the recent advances in application of browser extension with numerous examples focussing on the relevance of different approaches adopted by the libraries. Providing a framework of proportionate implementation along checkpoints, the study also highlights degree of acceptance of browser extension among libraries in different regions. Research limitations/implications – The investigation was restricted to libraries having English websites and confined to four continents only. This study aims at improving understanding among the librarians about the intended use and application of browser extension and helping them benchmark their effort in support of education, research and training. The current investigation expands the scope of future research on remaining regions and website whose contents are in non-English language to attain a broader perspective of its implementation. Originality/value – The article may guide library professionals to use, develop and promote the implementation of browser extension in libraries. The checkpoints used here may serve as bedrock for framing questionnaire and interview schedule for conducting future research examining users’ perception of browser extension in the context of library resources and usage pattern, to fully comprehend its practicability and usefulness.
APA, Harvard, Vancouver, ISO, and other styles
9

Rankin, Jeff H., and Irina Kondratova. "Mobile multimodal extensions to collaborative Web-based systems." Canadian Journal of Civil Engineering 33, no. 12 (December 1, 2006): 1470–79. http://dx.doi.org/10.1139/l06-096.

Full text
Abstract:
The development of leading-edge multimodal (e.g., concurrent text, voice, and video capabilities) mobile applications as a technology that holds promise for the construction industry is described. Because of the complexity of the products, the relatively short execution time frame, and the number of parties involved, the information exchanged throughout an architectural, engineering, and construction (AEC) project is extensive. Efficiently managing this information exchange is a significant impediment to increasing the overall productivity of the industry. The technology focus of this paper extends today's tools by addressing one of the unique characteristics of the industry: the need for mobility of real-time information in an integrated and collaborative environment. Mobile computing devices have the capabilities and characteristics for wide use in real-time communication of project information to project repositories or between project participants. As the industry moves away from the desktop and laptop Web paradigms toward the mobile Web paradigm, the availability of real-time complete information exchange with the project information repository presents new opportunities for decision-making in the AEC industry. To facilitate more widespread use of the solution applications described, extensive usability research in light of the various processes in the AEC industry is needed; a preliminary framework for this purpose is presented.Key words: project information management, collaborative information systems, mobile computing, multimodal functionality.
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Chun Mei, Jian Hua Sun, Hao Chen, and Xiang Hua Xu. "Privilege Separation in Browser Extensions Based on Web Workers." Advanced Materials Research 989-994 (July 2014): 4675–79. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4675.

Full text
Abstract:
In this paper, we propose to use Web Workers [1], isolated parallel threads in current browser working in the background, to enforce privilege separation in chrome extensions. Our tests show that our design is applicable to most chrome extensions (those not using the jquery library) and achieves a reduction in TCB up to 77 percent for our examples. Our implementation shows that our design is efficient enough to enforce privilege separation in chrome extensions and not needs to modify the browser or learn new high-level languages.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Web extensions"

1

Joelsson, Tomas. "Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91862.

Full text
Abstract:
Mobile web browsers of today have many of the same capabilities as their desktop counterparts. However, among the capabilities they lack is a way for web applications to interact with local devices. While today’s mobile phones commonly include GPS receivers and digital cameras, these local devices are currently not accessible from within the browser. The only means of utilizing these devices is by using standalone applications, but such applications lack the versatility of web browsers. If a mobile browser could utilize these local devices, then a mobile application could run within the browser, thus avoiding the need for specialized client software. This thesis suggests an approach for adding such capabilities to mobile browsers. In the proposed method, scripted access to local device functionality is facilitated by a local Java application. This application acts as a proxy server and allows the browser to call methods exposed by the local Java APIs. Both the benefits and some security concerns of this approach are examined. The benefits are further highlighted through two example web applications which utilize local devices.
I dagens mobila webbläsare återfinns det mesta av funktionaliteten från webbläsare för datorer. Det som dock fortfarande saknas är möjligheten för webbapplikationer att komma åt lokala telefonfunktioner. Dagens mobiltelefoner är ofta utrustade med GPS-mottagare och digitalkameror, men dessa kan för närvarande ej nås från webbläsaren. Det enda sättet att utnyttja dessa inbyggda funktioner är genom separata applikationer, men sådana applikationer är inte lika mångsidiga som webbläsare. Om en mobil webbläsare kunde utnyttja de inbyggda funktionerna, så skulle en mobil applikation kunna köras i webbläsaren istället för att ha separat klientprogramvara. Det här examensarbetet föreslår ett sätt att ge denna möjlighet till mobila webbläsare. I den föreslagna metoden används en lokal Java-applikation för att ge tillgång till inbyggda funktioner via skript. Denna applikation fungerar som en proxy-server och låter webbläsaren anropa metoder exponerade av lokala Java-API. Både fördelar och några säkerhetsproblem med den här lösningen undersöks. Fördelarna visas ytterligare genom två exempel på webbapplikationer som utnyttjar inbyggda telefonfunktioner.
APA, Harvard, Vancouver, ISO, and other styles
2

Zaccheus, Stan-Erik. "A framework for creating observable web services." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177576.

Full text
Abstract:
In the intelligence community, intelligence is defined as the right information to the right party at the right time. This definition also applies to business intelligence used by government and financial institutions, patient information used by healthcare providers and meteorological and geological reports provided by research institutions and environmental agencies. Modern software development has to tackle the problems associated with building large and complex distributed systems that have to deliver business value in a reliable and timely fashion; even the best prediction has no value if it is delivered after the fact. It is imperative that the producers in a larger system are responsible for publishing their output to minimize the lead-time for consumers. Using regular web services, the consumer can only check for new data by polling the producer. In a system with many consumers, resources are wasted handling these status requests. Instead of the client interacting with service provider, the client should be reacting to it. The reactive programming model supports building systems with these properties. On the .NET platform, the Reactive Extensions library provides functionality for creating reactive applications by composing functions that operate on asynchronous event streams. The library provides powerful tools for building reactive programs, unfortunately it does not contain an abstraction for inter-process event streams that is needed for building distributed reactive systems. This thesis presents the design and implementation of a framework for creating and using observable web services as a means to bridge the inter-process gap that exist when building a system using Reactive Extensions. The solution is based on a conceptual modeled created by extending the web service architecture. The solution is implemented as a framework made up by two parts; a service component used for creating observable web services and client component that connects to an observable web service and generates code used for subscribing to events exposed by that service. The client subscription functionality integrates with Reactive Extensions, making it possible to build reactive and distributed systems. Integration tests are used to verify that the implementation fulfils the requirements specified for the conceptual model.
I underrättelsevärlden definieras en underrättelse som väsentlig information förmedlad till rätt instans vid rätt tidpunkt. Samma definition gäller för omvärldsanalys som används av regeringar och finansinstitut, patientinformation som används av vårdaktörer och metrologiska och geologiska rapporter som tillhandahålls av forskningsinstitut och miljöorganisationer. Modern mjukvaruutveckling måste lösa problem associerade med att bygga stora, komplexa och distribuerade system som på ett tillförlitligt sätt ska leverera företagsnytta i rätt tid; även den bästa förutsägelsen är utan värde om den levereras för sent. Det är absolut nödvändigt producenter i ett större system ansvarar för att publicera sitt data så att konsumenter kan agera med så lite ledtid som möjligt. Vid användande av vanliga webtjänster måste klienten aktivt fråga om ny data finns tillgänglig. I ett system med många användare slösas resurser på att hantera statusefterfrågningar. Istället för att klienten interagerar interaktivt med tjänsten, borde den istället reagera reaktivt. Med den reaktiva programmeringsmodellen stöds systemkonstruktion med dessa egenskaper. På .NET-plattformen tillhandahåller kodbiblioteket Reactive Extensions funktionalitet för att skapa reaktiva applikationer genom skapandet av funktioner som arbetar med asynkrona händelseströmmar. Biblioteket tillhandahåller kraftfulla verktyg för utformningen av reaktiva program, dock innehåller den inte en abstraktion för arbete med händelseströmmar som rör sig mellan olika processer, en nödvändighet för skapandet av distribuerade reaktiva system. Denna uppsats presenterar den bakomliggande designen och implementationen av ett ramverk för skapandet och användandet av observerbara webtjänster vars syfte är att brygga händelseströmmar mellan olika processer. Lösningen är baserad på en konceptuell modell som bygger på arkitekturen för webbtjänster. Den är implementerad som ett ramverk som består av två delar; en tjänstekomponent som används för att skapa observerbara webbtjänster och klientkomponent som ansluter till en observerbar webbtjänst och genererar kod som används för att prenumerera på händelser som exponeras av denna tjänst. Prenumerationsfunktionaliteten är skapad för att fungera med Reactive Extensions och gör det möjligt att bygga reaktiva och distribuerade system. Integrationstest används för att kontrollera att ramverket uppfyller de krav som anges för den konceptuella modellen.
APA, Harvard, Vancouver, ISO, and other styles
3

Jarosch, Dennis. "Effects and opportunities of native code extensions for computationally demanding web applications." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2012. http://dx.doi.org/10.18452/16451.

Full text
Abstract:
Das World Wide Web befindet sich im Wandel von interaktiven Webseiten hin zu Web- Applikationen. Eine steigende Zahl von Anwendern führt täglich Aufgaben ausschließlich mit Hilfe des Web-Browsers durch. Dadurch wird das Web zu einer bedeutenden Plattform für Anwendungsentwicklung. Dieser Plattform fehlt jedoch heute noch die Rechenleistung nativer Applikationen. Microsoft Xax und Google Native Client (NaCl) sind zwei neue, unabhängige Technologien zur Entwicklung nativer Web-Applikationen. Sie ermöglichen die Erweiterung herkömmlicher Web-Applikationen durch kompilierten nativen und dennoch betriebssystemunabhängigen Programmcode. Die vorliegende Dissertation untersucht die Vor- und Nachteile nativer Web-Applikationen und analysiert zudem das tatsächliche Leistungsvermögen im Vergleich zu konventionellen JavaScript Web-Applikationen. Dazu wird eine experimentelle Leistungsanalyse von nativen Applikationen in C, JavaScript Web-Applikationen und NaCl nativen Web-Applikationen anhand vier unterschiedlicher Vergleichstests durchgeführt. Dabei werden die folgenden Leistungsaspekte betrachtet: mathematische Operationen (seriell und parallel), 3D-Grafikoperationen und Datenverarbeitung. Die Ergebnisse der Leistungsanalyse zeigen, dass NaCl Stärken in mathematischen und 3D-Grafikoperationen zu Grunde liegen, jedoch erhebliche Schwächen bei der Datenverarbeitung aufweist. Entsprechende Lösungsansätze zur Optimierung der Anwendung werden erarbeitet und erörtert. Eine Bewertung anhand technischer und nicht-technischer Kriterien komplementiert die Ergebnisse der Leistungsanalyse. Darüber hinaus werden die technischen, politischen und strategischen Treiber für NaCls Marktdurchdringung diskutiert.
The World Wide Web is amidst a transition from interactive websites to web applications. An increasing number of users perform their daily computing tasks entirely within the web browser, turning the Web into an important platform for application development. The Web as a platform, however, lacks the computational performance of native applications. This problem has motivated the inception of Microsoft Xax and Google Native Client (NaCl), two independent projects that facilitate the development of native web applications. These allow the extension of conventional web applications with compiled native code, while maintaining operating system portability. This dissertation determines the benefits and drawbacks of native web applications. It also examines the actual performance capabilities of JavaScript web applications. An experimental performance analysis is undertaken in order to determine and compare the performance characteristics of native C applications, JavaScript web applications, and NaCl native web applications. Four application benchmarks consider different performance aspects: number crunching (serial and parallel), 3D graphics performance, and data processing. The results confirm that NaCl''s performance in computational tasks and 3D graphics is impeccable. On the other hand, it shows substantial limitations in data processing. These are evaluated and possible solutions are discussed. The results of the performance analysis are complemented with an evaluation on the basis of technical and non-technical criteria and a discussion of the technical, political, and strategic drivers for NaCl.
APA, Harvard, Vancouver, ISO, and other styles
4

Dodda, Srinivasa Rao. "Improvements and extensions of a web-tool for finding candidate genes associated with rheumatoid arthritis." Thesis, University of Skövde, School of Humanities and Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-26.

Full text
Abstract:

QuantitativeTraitLocus (QTL) is a statistical method used to restrict genomic regions contributing to specific phenotypes. To further localize genes in such regions a web tool called “Candidate Gene Capture” (CGC) was developed by Andersson et al. (2005). The CGC tool was based on the textual description of genes defined in the human phenotype database OMIM. Even though the CGC tool works well, the tool was limited by a number of inconsistencies in the underlying database structure, static web pages and some gene descriptions without properly defined function in the OMIM database. Hence, in this work the CGC tool was improved by redesigning its database structure, adding dynamic web pages and improving the prediction of unknown gene function by using exon analysis. The changes in database structure diminished the number of tables considerably, eliminated redundancies and made data retrieval more efficient. A new method for prediction of gene function was proposed, based on the assumption that similarity between exon sequences is associated with biochemical function. Using Blast with 20380 exon protein sequences and a threshold E-value of 0.01, 639 exon groups were obtained with an average of 11 exons per group. When estimating the functional similarity, it was found that on the average 72% of the exons in a group had at least one Gene Ontology (GO) term in common.

APA, Harvard, Vancouver, ISO, and other styles
5

Priefer, Dennis [Verfasser], and Gabriele [Akademischer Betreuer] Taentzer. "Applying Model-Driven Engineering to Development Scenarios for Web Content Management System Extensions / Dennis Priefer ; Betreuer: Gabriele Taentzer." Marburg : Philipps-Universität Marburg, 2021. http://d-nb.info/1240383894/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Somé, Dolière Francis. "Sécurité et vie privée dans les applications web." Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.

Full text
Abstract:
Dans cette thèse, nous nous sommes intéressés aux problématiques de sécurité et de confidentialité liées à l'utilisation d'applications web et à l'installation d'extensions de navigateurs. Parmi les attaques dont sont victimes les applications web, il y a celles très connues de type XSS (ou Cross-Site Scripting). Les extensions sont des logiciels tiers que les utilisateurs peuvent installer afin de booster les fonctionnalités des navigateurs et améliorer leur expérience utilisateur. Content Security Policy (CSP) est une politique de sécurité qui a été proposée pour contrer les attaques de type XSS. La Same Origin Policy (SOP) est une politique de sécurité fondamentale des navigateurs, régissant les interactions entre applications web. Par exemple, elle ne permet pas qu'une application accède aux données d'une autre application. Cependant, le mécanisme de Cross-Origin Resource Sharing (CORS) peut être implémenté par des applications désirant échanger des données entre elles. Tout d'abord, nous avons étudié l'intégration de CSP avec la Same Origin Policy (SOP) et démontré que SOP peut rendre CSP inefficace, surtout quand une application web ne protège pas toutes ses pages avec CSP, et qu'une page avec CSP imbrique ou est imbriquée dans une autre page sans ou avec un CSP différent et inefficace. Nous avons aussi élucidé la sémantique de CSP, en particulier les différences entre ses 3 versions, et leurs implémentations dans les navigateurs. Nous avons ainsi introduit le concept de CSP sans dépendances qui assure à une application la même protection contre les attaques, quelque soit le navigateur dans lequel elle s'exécute. Finalement, nous avons proposé et démontré comment étendre CSP dans son état actuel, afin de pallier à nombre de ses limitations qui ont été révélées dans d'autres études. Les contenus tiers dans les applications web permettent aux propriétaires de ces contenus de pister les utilisateurs quand ils naviguent sur le web. Pour éviter cela, nous avons introduit une nouvelle architecture web qui une fois déployée, supprime le pistage des utilisateurs. Dans un dernier temps, nous nous sommes intéressés aux extensions de navigateurs. Nous avons d'abord démontré que les extensions qu'un utilisateur installe et/ou les applications web auxquelles il se connecte, peuvent le distinguer d'autres utilisateurs. Nous avons aussi étudié les interactions entre extensions et applications web. Ainsi avons-nous trouvé plusieurs extensions dont les privilèges peuvent être exploités par des sites web afin d'accéder à des données sensibles de l'utilisateur. Par exemple, certaines extensions permettent à des applications web d'accéder aux contenus d'autres applications, bien que cela soit normalement interdit par la Same Origin Policy. Finalement, nous avons aussi trouvé qu'un grand nombre d'extensions a la possibilité de désactiver la Same Origin Policy dans le navigateur, en manipulant les entêtes CORS. Cela permet à un attaquant d'accéder aux données de l'utilisateur dans n'importe qu'elle autre application, comme par exemple ses mails, son profile sur les réseaux sociaux, et bien plus. Pour lutter contre ces problèmes, nous préconisons aux navigateurs un système de permissions plus fin et une analyse d'extensions plus poussée, afin d'alerter les utilisateurs des dangers réels liés aux extensions
In this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
APA, Harvard, Vancouver, ISO, and other styles
7

Jarosch, Dennis [Verfasser], Robert [Akademischer Betreuer] Funk, and Ph D. Michael [Akademischer Betreuer] Seadle. "Effects and opportunities of native code extensions for computationally demanding web applications / Dennis Jarosch. Gutachter: Robert Funk ; Michael Seadle, Ph.D." Berlin : Humboldt Universität zu Berlin, Philosophische Fakultät I, 2012. http://d-nb.info/1019361786/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Norberg, Tobias, Andreas Oskarsson, and Martin Kling. "Web application development : a study on UML Web Application Extension." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1689.

Full text
Abstract:
The complexity of Web sites are increasing and transforming into Web applications that contain business logic, interactivity, transaction handling and states. This phenomenon forces the Web developers to adapt more traditional software engineering techniques to keep the Web applications error free, maintainable, reusable, well documented etc. Many Web developers do not use any engineering techniques at all and design mainly to create as fashionable applications as possible with no regards on the application?s functionality. This results in applications that are hard to maintain and with poor functionality. The purpose with this thesis was to see if the use of a more traditional software engineering technique, namely the Unified Modeling Language with the newly added Web Application Extension, resulted in a Web application with good design regarding the maintainability of the application. To investigate the maintainability of an application, the maintainability was further divided into three sub criteria: extensibility, reusability and documentation. These three criteria were then applied on a case study were a Web application was designed. From the analysis of the final design, using the three criteria, the maintainability was derived. The result of the entire investigation showed that the UML WAE had a good support for extensibility, fair support for reusability and very good support for documentation. From these results the main conclusion was derived, that the use of UML WAE resulted in good design regarding the maintainability. However, the result is limited to our case study and the design created in that case. The result may have been different if the three criteria had been applied on a different case. Another aspect to consider is that the quality of a design is often dependent on the knowledge of the persons that carry out the design.
APA, Harvard, Vancouver, ISO, and other styles
9

Branderský, Gabriel. "Knihovna znovupoužitelných komponent a utilit pro framework Angular 2." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363860.

Full text
Abstract:
Táto práca sa zaoberá vytvorením knižnice znovapoužiteľných komponent a utilít určené na použitie v dátavo-intenzívnych aplikáciach. Jednou typickou komponentou pre také aplikácie je tabuľka, ktorá je považovaná za hlavnú komponentu knižnice. Pre zaistenie vysokej kohezie sú všetky ostatné komponenty a utility sú s nou úzko prepojené. Výsledná sada komponent je použiteľná deklaratívným spôsobom a umožnuje rôzne konfigurácie. Uživateľské rozhranie je tiež prizpôsobené na dátovo-intenzívne aplikácie s rôznymi prvkami.
APA, Harvard, Vancouver, ISO, and other styles
10

Alkhateeb, Faisal. "Interroger RDF(S) avec des expressions régulières." Phd thesis, Université Joseph Fourier (Grenoble), 2008. http://tel.archives-ouvertes.fr/tel-00293206.

Full text
Abstract:
RDF est un langage de représentation des connaissances dédié à l'annotation des ressources dans le Web Sémantique. Bien que RDF peut être lui-même utilisé comme un langage de requêtes pour interroger une base de connaissances RDF (utilisant la conséquence RDF), la nécessité d'ajouter plus d'expressivité dans les requêtes a conduit à définir le langage de requêtes SPARQL. Les requêtes SPARQL sont définies à partir des patrons de graphes qui sont fondamentalement des graphes RDF avec des variables. Les requêtes SPARQL restent limitées car elles ne permettent pas d'exprimer des requêtes avec une séquence non-bornée de relations (par exemple, Existe-t-il un itinéraire d'une ville A à une ville B qui n'utilise que les trains ou les bus?"). Nous montrons qu'il est possible d'étendre la syntaxe et la sémantique de RDF, définissant le langage PRDF (pour Path RDF) afin que SPARQL puisse surmonter cette limitation en remplaçant simplement les patrons de graphes basiques par des graphes PRDF. Nous étendons aussi PRDF à CPRDF (pour Constrained Path RDF) permettant d'exprimer des contraintes sur les sommets des chemins traversés (par exemple, "En outre, l'une des correspondances doit fournir une connexion sans fil."). Nous avons fourni des algorithmes corrects et complets pour répondre aux requêtes (la requête est un graphe PRDF ou CPRDF, la base de connaissances est un graphe RDF) basés sur un homomorphisme particulier, ainsi qu'une analyse détaillée de la complexité. Enfin, nous utilisons les graphes PRDF ou CPRDF pour généraliser les requêtes SPARQL, définissant les extensions PSPARQL et CPSPARQL, et fournissons des tests expérimentaux en utilisant une implémentation complète de ces deux langages.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Web extensions"

1

Barr, Catherine. Web assessment development assistant further extensions. [s.l: The Author], 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Inc, ebrary, ed. TYPO3 extension development: Developer's guide to creating feature-rich extensions using the TYPO3 API. Birmingham, UK: Packt Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sarkar, Suhreed. Joomla! 1.5 top extensions cookbook. Birmingham [England]: Packt Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ray, West, ed. Building Dreamweaver 4 and Dreamweaver UltraDev 4 extensions. Berkeley, Calif: Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, ebrary, ed. Joomla! 1.5 JavaScript jQuery: Enhance your Joomla! sites with the power of jQuery extensions, plugins, and more. Birmingham, U.K: Packt Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

James, Kennard, and ebrary Inc, eds. Mastering Joomla! 1.5 extension and framework development: The professional guide to programming Joomla! : extend the power of Joomla! by adding components, modules, plugins, and other extensions. Birmingham, U.K: Packt Open Source, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Heinemann, Frédéric. BSP Extensions: how to master Web reporting with HTMLB: How to use undocumented HTMLB elements ; Web application development to manage code fragments. hierarchical navigation, table selection, detail display, comprehensive search templates, and much more. Fort Lee, NJ [u.a.]: Galileo Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Learning Joomla! 1.5 extension development. Birmingham: Packt, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dreamweaver extension wang ye te xiao jue zhao. Taibei Shi: Qi feng zi xun gu fen you xian gong si, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stauffer, Todd. The complete idiot's guide to Macintosh OS 8.5. Indianapolis, Ind: Que Alpha Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Web extensions"

1

Wootton, Cliff. "Client Browser Extensions." In The Web Professional’s Handbook, 180–99. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-5362-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zakas, Nicholas C. "DOM Extensions." In Professional Javascript® for Web Developers, 357–80. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722176.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kent, Allan, David Powers, and Rachel Andrew. "Dreamweaver Extensions." In PHP Web Development with Macromedia Dreamweaver MX 2004, 247–94. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0701-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tao, Cui, Natalya F. Noy, Harold R. Solbrig, Nigam H. Shah, Mark A. Musen, and Christopher G. Chute. "Proposed SKOS Extensions for BioPortal Terminology Services." In The Semantic Web, 342–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29923-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Richards, Robert. "Other XML Technologies and Extensions." In Pro PHP XML and Web Services, 811–38. Berkeley, CA: Apress, 2006. http://dx.doi.org/10.1007/978-1-4302-0139-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

deHaan, Jen, Peter deHaan, Simon Horwith, Curtis Hermann, Massimo Foti, and Eduardo Zubler. "Dreamweaver MX 2004 Extensions." In ColdFusion Web Development with Macromedia Dreamweaver MX 2004, 279–302. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0685-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Andrew, Rachel, Rob Turnbull, Alan Foley, and Drew McLellan. "Dreamweaver MX 2004 Extensions." In ASP Web Development with Macromedia Dreamweaver MX 2004, 321–46. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0722-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Calì, Andrea, Georg Gottlob, and Thomas Lukasiewicz. "Datalog Extensions for Tractable Query Answering over Ontologies." In Semantic Web Information Management, 249–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04329-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gleim, Lars, Liam Tirpitz, and Stefan Decker. "HTTP Extensions for the Management of Highly Dynamic Data Resources." In The Semantic Web, 212–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77385-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sydow, Marcin. "Extensions of PageRank. The RBS Algorithm." In Intelligent Information Processing and Web Mining, 389–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-39985-8_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Web extensions"

1

Pardal, Miguel. "Core Mechanisms for Web Services Extensions." In Third International Conference on Next Generation Web Services Practices (NWeSP'07). IEEE, 2007. http://dx.doi.org/10.1109/nwesp.2007.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Adams, Carlisle, and Sharon Boeyen. "UDDI and WSDL extensions for Web service." In the 2002 ACM workshop. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/764792.764798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Perera, Srinath, and Dennis Gannon. "Enabling Web Service extensions for scientific workflows." In 2006 Workshop on Workflows in Support of Large-Scale Science (WORKS06). IEEE, 2006. http://dx.doi.org/10.1109/works.2006.5282346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Villoldo, Enric Jaen, Joan Serrat-Fernandez, and Emilio Luque. "Improving Web Services Interoperability with Binding Extensions." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu, and Jian Huang. "Alpaca: AR Graphics Extensions for Web Applications." In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu, and Jian Huang. "Alpaca: AR Graphics Extensions for Web Applications." In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.1581207820146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Obimbo, Charlie, Yong Zhou, and Randy Nguyen. "Analysis of Vulnerabilities of Web Browser Extensions." In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Some, Doliere Francis. "EmPoWeb: Empowering Web Applications with Browser Extensions." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sjösten, Alexander, Steven Van Acker, and Andrei Sabelfeld. "Discovering Browser Extensions via Web Accessible Resources." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3029806.3029820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xing, Xinyu, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. "Understanding Malvertising Through Ad-Injecting Browser Extensions." In WWW '15: 24th International World Wide Web Conference. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, 2015. http://dx.doi.org/10.1145/2736277.2741630.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Web extensions"

1

Dusseault, L., ed. HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV). RFC Editor, June 2007. http://dx.doi.org/10.17487/rfc4918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clemm, G., J. Crawford, and J. Whitehead. Binding Extensions to Web Distributed Authoring and Versioning (WebDAV). Edited by J. Reschke. RFC Editor, April 2010. http://dx.doi.org/10.17487/rfc5842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clemm, G., J. Amsden, T. Ellison, C. Kaler, and J. Whitehead. Versioning Extensions to WebDAV (Web Distributed Authoring and Versioning). RFC Editor, March 2002. http://dx.doi.org/10.17487/rfc3253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daboo, C. CardDAV: vCard Extensions to Web Distributed Authoring and Versioning (WebDAV). RFC Editor, August 2011. http://dx.doi.org/10.17487/rfc6352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wilson, D., Daniel Breton, Lauren Waldrop, Danney Glaser, Ross Alter, Carl Hart, Wesley Barnes, et al. Signal propagation modeling in complex, three-dimensional environments. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40321.

Full text
Abstract:
The Signal Physics Representation in Uncertain and Complex Environments (SPRUCE) work unit, part of the U.S. Army Engineer Research and Development Center (ERDC) Army Terrestrial-Environmental Modeling and Intelligence System (ARTEMIS) work package, focused on the creation of a suite of three-dimensional (3D) signal and sensor performance modeling capabilities that realistically capture propagation physics in urban, mountainous, forested, and other complex terrain environments. This report describes many of the developed technical capabilities. Particular highlights are (1) creation of a Java environmental data abstraction layer for 3D representation of the atmosphere and inhomogeneous terrain that ingests data from many common weather forecast models and terrain data formats, (2) extensions to the Environmental Awareness for Sensor and Emitter Employment (EASEE) software to enable 3D signal propagation modeling, (3) modeling of transmitter and receiver directivity functions in 3D including rotations of the transmitter and receiver platforms, (4) an Extensible Markup Language/JavaScript Object Notation (XML/JSON) interface to facilitate deployment of web services, (5) signal feature definitions and other support for infrasound modeling and for radio-frequency (RF) modeling in the very high frequency (VHF), ultra-high frequency (UHF), and super-high frequency (SHF) frequency ranges, and (6) probabilistic calculations for line-of-sight in complex terrain and vegetation.
APA, Harvard, Vancouver, ISO, and other styles
6

Neves, Mateus C. R., Felipe De Figueiredo Silva, and Carlos Otávio Freitas. The Effect of Extension Services and Credit on Agricultural Production in Bolivia, Peru, and Colombia. Inter-American Development Bank, July 2021. http://dx.doi.org/10.18235/0003404.

Full text
Abstract:
In this paper we estimate the average treatment effect from access to extension services and credit on agricultural production in selected Andean countries (Bolivia, Peru, and Colombia). More specifically, we want to identify the effect of accessibility, here represented as travel time to the nearest area with 1,500 or more inhabitants per square kilometer or at least 50,000 inhabitants, on the likelihood of accessing extension and credit. To estimate the treatment effect and identify the effect of accessibility on these variables, we use data from the Colombian and Bolivian Agricultural Censuses of 2013 and 2014, respectively; a national agricultural survey from 2017 for Peru; and geographic information on travel time. We find that the average treatment effect for extension is higher compared to that of credit for farms in Bolivia and Peru, and lower for Colombia. The average treatment effects of extension and credit for Peruvian farms are $2,387.45 and $3,583.42 respectively. The average treatment effect for extension and credit are $941.92 and $668.69, respectively, while in Colombia are $1,365.98 and $1,192.51, respectively. We also find that accessibility and the likelihood of accessing these services are nonlinearly related. Results indicate that higher likelihood is associated with lower travel time, especially in the analysis of credit.
APA, Harvard, Vancouver, ISO, and other styles
7

Beatty, William D., and III. Department of Defense, Inc. Are We Ready To Become An Extension of Corporate America. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada362978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Avellán, Leopoldo M., Vitor Goncalves Cavalcanti, Pedro M. Garberi, Luis T. Marcano, and Abraham R. Montilla. Why Is the Number of IDB Projects with Extensions beyond 24 Months Increasing?: Should We Be Concerned? Inter-American Development Bank, August 2018. http://dx.doi.org/10.18235/0001317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brianne, Selman, Brian Fauteux, and Andrew deWaard. A User-Centric Case for Rights Reversions and Other Mitigations: The Cultural Capital Project Submission to ISED Consultation on Term Extension. University of Winnipeg Library, March 2021. http://dx.doi.org/10.36939/ir.202103091613.

Full text
Abstract:
Term extension is unlikely to benefit any but the largest of rightsholders, and indeed, in general independent creators typically do not benefit greatly from the promised financial exploitation promised by copyrights. This has been made even more evident by the COVID pandemic - while copyrighted works are consumed more than ever, independent creators have sunk further into poverty. We propose mitigation strategies for term extension that would help the people who are creating Canada’s cultural landscape, as well as additional actions that would alleviate additional current copyright losses.
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmadi, S. Real-Time Transport Protocol (RTP) Payload Format for the Variable-Rate Multimode Wideband (VMR-WB) Extension Audio Codec. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography