References
- Web Application Security Consortium, "WebAppSec: threat classification," online, January 2010. [Visited: March 2018].
- Venkata Anirudh Bhandhari, "Analysis of Web Browser Security Policies and A Multiplatform and Multibrowser Browser Configuration Tool: Open Browser GP," Master's thesis, University of Idaho, August 2015.
- Daniel Conte de Leon, Venkata Anirudh Bhandari, Ananth A. Jillepalli, and Frederic T. Sheldon, "Using A Knowledge-based Security Orchestration Tool to Reduce the Risk of Browser Compromise," in Proc. of 2016 IEEE 07th Symposium Series On Computational Intelligence (SSCI-2016), December 2016.
- Ananth A. Jillepalli, "HiFiPol:Browser - Securing the Web Browsing Ecosystem," Master's thesis, University of Idaho, May 2017.
- Ananth A. Jillepalli and Daniel Conte de Leon, "An Architecture for a Policy-oriented Web Browser Management System: HiFiPol: Browser," in Proc. of 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC-2016), June 2016.
- Ananth A. Jillepalli, Daniel Conte de Leon, Stuart Steiner, and Frederick T. Sheldon, "HERMES: A High-level Policy Language for High-granularity Enterprise-wide Secure Browser Configuration Management," in Proc. of 2016 IEEE 07th Symposium Series On Computational Intelligence (SSCI-2016), December 2016.
- Jeremy Moskowitz, "Inside ADM and ADMX Templates for Group Policy," online, January 2008. [Visited: March 2018].
- Judith Herman, "Managing Group Policy ADMX files: A Step-by-step Guide," online, June 2007. [Visited: March 2018].
- Jack Stromberg, "Configuring Google Chrome via Group Policy," online, August 2013. [Visited: March 2018].
- National Security Agency - Central Security Service, "Deploying and Securing Google Chrome in a Windows Enterprise," online, October 2012. [Visited; March 2018].
- Redkitten Corporation, "How to Install a Firefox Add-on," online, June 2015. [Visited: March 2018].
- MozillaZine Knowledge Base, "about:config Entries," online, June 2015. [Visited: Mach 2018].
- Red Hat Inc., "FreeIPA," online, June 2015. [Visited: March 2018].
- Quest Software Inc., "KACE Systems Management Appliance: Patch Management and Endpoint Security," online, November 2016. [Visited: March 2018].
- StatCounter, "Statcounter global stats," online, December 2014. [Visited: March 2018].
- Daniel B. Cid, "Open Source Security [OSSEC]," online, June 2012. [Visited: March 2018].
- Zachary Kessin, "Building Web Applications with Erlang," 1st Edition, O'Reilly, Springfield, Missouri, June 2012.
- Accuvant Labs, "Browser Security Comparison - A Quantitative Approach," online, December 2011. [Visited: March 2018].
- Microsoft Research "Policy Language Research," online, June 2015. [Visited: March 2018].
- Tao Xie, Vincent Hu and Rick Kunh, "Testing and Verification of Security Policy," online, June 2016. [Visited: March 2018].
- National Institute of Standards and Technology, "XCCDF - The Extensible Configuration Checklist Description Format," online, September 2011. [Visited: March 2018].
- Timothy Nelson, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi, "The Margrave Tool for Firewall Analysis," in Proc. of USENIX Large Installation System Administration Conference (LISA), San Jose, CA, November 07-12, 2010.
- Dan Dougherty and Kathi Fisler and Shriram Krishnamurthi, "The Margrave Policy Analyzer," online, May 2015. [Visited: March 2018].
- J. B. Bernabe, J. M. M. Perez, J. M. A. Calero, J. D. J. Re, F. J. Clemente, G. M. Perez, and A. F. Skarmeta, "Security policy specification," Network and Traffic Engineering in Emerging Distributed Computing Applications, J. Abawajy, M. Pathan, M. Rahman, and M. M. Deris, Eds. Oxford: IGI Global, ch. 04, pp. 66-93, 2013.
- National Institute of Standards and Technology, "Emerging Specification Listing," online, March 2018. [Visited: March 2018].
- Ananth A. Jillepalli, Daniel Conte de Leon, Stuart Steiner, Frederick T. Sheldon, and Michael A. Haney, "Hardening the client-side: A guide to enterprise-level hardening of web browsers," in Proc. of 2017 IEEE 15th Dependable, Autonomic and Secure Computing (DASC-2017), Nov. 2017.
Cited by
- STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme vol.29, pp.3, 2018, https://doi.org/10.13089/jkiisc.2019.29.3.599