Crowdsourced web augmentation: A security model

10Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Web augmentation alters the rendering of existing Web applications at the back of these applications. Changing the layout, adding/removing content or providing additional hyperlinks/widgets are examples of Web augmentation that account for a more personalized user experience. Crowdsourced Web augmentation considers end users not only the beneficiaries but also the contributors of augmentation scripts. The fundamental problem with so augmented Web applications is that code from numerous and possibly untrusted users are placed into the same security domain, hence, raising security and integrity concerns. Current solutions either coexist with the danger (e.g. Greasemonkey, where scripts work on the same security domain that the hosting application) or limit augmentation possibilities (e.g. virtual iframes in Google's Caja, where the widget is prevented from accessing the application space). This work introduces Modding Interfaces: application-specific interfaces that regulate inflow and outflow communication between the hosting code and the user code. The paper shows how the combined use of sandboxed iframes and "modding-interface" HTML5 channels ensures application integrity while permitting controlled augmentation on the hosting application. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Arellano, C., Díaz, O., & Iturrioz, J. (2010). Crowdsourced web augmentation: A security model. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6488 LNCS, pp. 294–307). https://doi.org/10.1007/978-3-642-17616-6_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free