John Lyle
Editor
Proceedings of the Workshop on web applications and secure hardware (WASH 2013).
Contributors
Shamal Faily
Editor
Marcel Winandy
Editor
Abstract
Web browsers are becoming the platform of choice for applications that need to work across a wide range of different devices, including mobile phones, tablets, PCs, TVs and in-car systems. However, for web applications which require a higher level of assurance, such as online banking, mobile payment, and media distribution (DRM), there are significant security and privacy challenges. A potential solution to some of these problems can be found in the use of secure hardware – such as TPMs, ARM TrustZone, virtualisation and secure elements – but these are rarely accessible to web applications or used by web browsers. The First Workshop on Web Applications and Secure Hardware (WASH'13) focused on how secure hardware could be used to enhance web applications and web browsers to provide functionality such as credential storage, attestation and secure execution. This included challenges in compatibility (supporting the same security features despite different user hardware) as well as multi-device scenarios where a device with hardware mechanisms can help provide assurance for systems without. Also of interest were proposals to enhance existing security mechanisms and protocols, security models where the browser is not trusted by the web application, and enhancements to the browser itself.
Citation
LYLE, J., FAILY, S. and WINANDY, M. (eds.) 2013. Proceedings of the Workshop on web applications and secure hardware (WASH 2013), co-located with the 6th International conference on trust and trustworthy computing (TRUST 2013), 20 June 2013, London, UK. CEUR workshop proceedings, 1011. Aachen: CEUR-WS [online]. Available from: http://ceur-ws.org/Vol-1011/
Presentation Conference Type | Edited Proceedings |
---|---|
Conference Name | Workshop on web applications and secure hardware (WASH 2013), co-located with the 6th International conference on trust and trustworthy computing (TRUST 2013) |
Start Date | Jun 20, 2013 |
Acceptance Date | Jun 20, 2013 |
Online Publication Date | Jul 13, 2013 |
Publication Date | Jul 13, 2013 |
Deposit Date | Dec 9, 2021 |
Publicly Available Date | Dec 9, 2021 |
Publisher | CEUR-WS |
Peer Reviewed | Peer Reviewed |
Series Title | CEUR workshop proceedings |
Series Number | 1011 |
Series ISSN | 1613-0073 |
Keywords | Web-based applications; Systems security; Multi-device applications; Data protection; Access and authorisation |
Public URL | https://rgu-repository.worktribe.com/output/1446742 |
Publisher URL | http://ceur-ws.org/Vol-1011/ |
Files
LYLE 2013 Proceedings of WASH 2013
(2.2 Mb)
PDF
Copyright Statement
© The authors and editors
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search