Sciweavers

3086 search results - page 109 / 618
» Developing Secure Web Applications
Sort
View
EDOC
2004
IEEE
15 years 6 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
ACSAC
2004
IEEE
15 years 6 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
COMPSAC
2003
IEEE
15 years 7 months ago
Migrating Web Frameworks Using Water Transformations
We propose an approach (based on Water Transformations) to migrate web applications between various web development frameworks. This migration process preserves the structure of t...
Ahmed E. Hassan, Richard C. Holt
COMPSAC
2006
IEEE
15 years 6 months ago
A Service-Oriented Design Framework for Secure Network Applications
Abstract---Service Oriented Architecture (SOA) is an architectural style to reuse and integrate existing systems for designing new applications. Each application is designed in an ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
116
Voted
IJNSEC
2006
88views more  IJNSEC 2006»
15 years 2 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang