Refine
Year of publication
- 2011 (2) (remove)
Document Type
- Study Thesis (1)
- Researchpaper (1)
Language
- English (2)
Has Fulltext
- yes (2)
Is part of the Bibliography
- no (2)
Keywords
- Codierung <Programmierung> (1)
- Distributed Code Review (1)
- Gerrit (1)
- Google Inc. (1)
- IPv6 (1)
- Programmcode (1)
- Programmdokumentation (1)
- Programmfehler (1)
- Programmierumgebung (1)
- Programmierung (1)
- Qualitätssic (1)
- SSL (1)
- TLS (1)
- browser (1)
- client tracking (1)
- code quality (1)
- cookies (1)
- fingerprint (1)
- geotargeting (1)
- git (1)
- search engine (1)
- secure search (1)
- secure sockets layer (1)
- software engineering (1)
- transport l (1)
- web bug (1)
Institute
- Computer Science and Media (Master) (2) (remove)
Secure Search
(2011)
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are very useful techniques to achieve this. The data collected can be used to derive a specific user profile. This information can be used by third parties to present personalized advertisements while surfing the web. In addition a potential attacker could monitor all web traffic of an user e.g. its search queries. As a conclusion the attacker knows the intentions of the web user and of the company he is working for. As competitors maybe very interested in such information, this could lead to a new form of industrial espionage. In this paper I present some of the techniques commonly used. I illustrate some problems caused by the usage of insecure transmission lines and compromised search engines. Some camouflage techniques presented may help to protect the web users identity. This paper is a based on the lecture "Secure Systems" teached by Professor Walter Kriha at the Media University (HdM) Stuttgart.
This paper gives an overview of the advantages and weaknesses of distributed source code review tools in software engineering. We cover this topic with a specific focus on Google’s freely available software Gerrit. In chapter 1 we discuss how code-reviews are generally useful for groups of programmers. We lay out how traditional approaches differ from distributed setups where developers may be vastly distributed from a geographical point of view or where meetings are otherwise contraindicated. In chapter 2 we discuss how users can interact with Gerrit, and chapter 3 covers some basic knowledge for those people who have to administer one or more Gerrit installations. Finally, chapter 4 summarizes key points and gives an outlook on the future role of distributed code-review.