Crowdsourced Web Augmentation: A Security Model | SpringerLink
Skip to main content

Crowdsourced Web Augmentation: A Security Model

  • Conference paper
Web Information Systems Engineering – WISE 2010 (WISE 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6488))

Included in the following conference series:

  • 1578 Accesses

Abstract

Web augmentation alters the rendering of existing Web applications at the back of these applications. Changing the layout, adding/removing content or providing additional hyperlinks/widgets are examples of Web augmentation that account for a more personalized user experience. Crowdsourced Web augmentation considers end users not only the beneficiaries but also the contributors of augmentation scripts. The fundamental problem with so augmented Web applications is that code from numerous and possibly untrusted users are placed into the same security domain, hence, raising security and integrity concerns. Current solutions either coexist with the danger (e.g. Greasemonkey, where scripts work on the same security domain that the hosting application) or limit augmentation possibilities (e.g. virtual iframes in Google’s Caja, where the widget is prevented from accessing the application space). This work introduces Modding Interfaces: application-specific interfaces that regulate inflow and outflow communication between the hosting code and the user code. The paper shows how the combined use of sandboxed iframes and “modding-interface” HTML5 channels ensures application integrity while permitting controlled augmentation on the hosting application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 12011
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Greasemonkey Homepage, http://www.greasespot.net/

  2. Monkey patch, http://en.wikipedia.org/wiki/Monkey_patch

  3. Bouvin, N.O.: Unifying Strategies for Web Augmentation. In: Proceedings of the 10th ACM Conference on Hypertext and Hypermedia, HYPERTEXT 1999 (1999)

    Google Scholar 

  4. Microsoft Corp. Microsoft Web Sandbox, http://websandbox.livelabs.com/

  5. Microsoft Corp. Microsoft Web Sandbox: QoS Layer, http://websandbox.livelabs.com/documentation/vm_qos.aspx

  6. Díaz, O., Arellano, C., Iturrioz, J.: Layman Tuning of Websites: Facing Change Resilience. In: The 17th International Conference on World Wide Web, WWW 2008 (2008)

    Google Scholar 

  7. Dojo. Secure Mashups with dojox.secure, http://www.sitepen.com/blog/2008/08/01/secure-mashups-with-dojoxsecure/

  8. Hoffman, B., Sullivan, B.: Web Mashups and Aggregators. In: AJAX Security, ch. 11, pp. 295–327. Addison-Wesley, Reading (2007)

    Google Scholar 

  9. Facebook Inc. Apps on Facebook, http://developers.facebook.com/docs/guides/canvas/

  10. Google Inc. Google Caja: A source-to-source translator for securing Javascript-based web content, http://code.google.com/p/google-caja/

  11. JCP. JSR 168: Portlet Specification Version 1.0 (2003), http://www.jcp.org/en/jsr/detail?id=168

  12. Maver, J., Popp, C.: Essential Facebook Development: Build Successful Applications for the Facebook Platform. Addison-Wesley, Reading (2009)

    Google Scholar 

  13. Möller, K., Bechhofer, S., Heath, T.: Semantic Web Conference Ontology (2007), http://data.semanticweb.org/ns/swc/ontology

  14. Scacchi, W.: Computer Game Mods, Modders, Modding, and the Mod Scene. First Monday 15 (2010)

    Google Scholar 

  15. Smith, M.K., Welty, C., McGuinness, D.L.: OWL Web Ontology Language Guide. W3C Recommendation (2004), http://www.w3.org/TR/owl-guide/

  16. Voas, J.: Certification: Reducing the Hidden Costs of Poor Quality. IEEE Software 16, 22–25 (1999)

    Article  Google Scholar 

  17. W3CDOMWG. W3C DOM Level 2, http://www.w3.org/DOM/DOMTR#dom2

  18. W3CHTML5WG. HTML5, http://www.w3.org/TR/html5/

  19. Yu, J., Benatallah, B., Casati, F., Daniel, F.: Understanding Mashup Development. IEEE Internet Computing 12, 44–52 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Arellano, C., Díaz, O., Iturrioz, J. (2010). Crowdsourced Web Augmentation: A Security Model. In: Chen, L., Triantafillou, P., Suel, T. (eds) Web Information Systems Engineering – WISE 2010. WISE 2010. Lecture Notes in Computer Science, vol 6488. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17616-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17616-6_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17615-9

  • Online ISBN: 978-3-642-17616-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics