Analysis of Browser-Extensions

posted in #IT Security on the 24.05.2017

This study deals with dangers potentially posed from browser extensions. Browser extensions can extend the functionality of modern web browsers […]

Contextual Data Exchange

posted in #eGovernment, IT Security on the 30.08.2016

We present a reusable data structure that addresses the issues of static, inflexible and practically non-interoperable authorization definitions. We first […]