Sciweavers

263 search results - page 20 / 53
» Applying the Semantic Web Layers to Access Control
Sort
View
ACMSE
2006
ACM
14 years 3 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
JUCS
2007
108views more  JUCS 2007»
13 years 9 months ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani
IEEESCC
2008
IEEE
14 years 3 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
APSCC
2009
IEEE
14 years 3 months ago
Translating Semantic Web Service based business process models
— We describe a model-driven translation approach between Semantic Web Service based business process models in the context of the SUPER project. In SUPER we provide a set of bus...
Liliana Cabral, John Domingue
ENTCS
2007
73views more  ENTCS 2007»
13 years 9 months ago
Towards Multiple Access in Generic Component Architectures
r introduces an abstract framework for the specification of components with multiple require and provide interfaces that allows the specification of multiple access to a single ...
Markus Klein, Julia Padberg, Fernando Orejas