Sciweavers

3086 search results - page 111 / 618
» Developing Secure Web Applications
Sort
View
IEEESP
2011
14 years 6 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
126
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
BPSC
2009
184views Business» more  BPSC 2009»
15 years 3 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
116
Voted
WSC
2007
15 years 4 months ago
A public health application of data analysis for homeland security
This presentation follows up the talk last year to WINFORMS (The Washington Institute for Operations Research and The Management Sciences) in which an approach developed for the a...
Marjorie Greene, Robert Eek
ICWE
2007
Springer
15 years 8 months ago
Engineering Semantic-Based Interactive Multi-device Web Applications
Abstract. To build high-quality personalized Web applications developers have to deal with a number of complex problems. We look at the growing class of personalized Web Applicatio...
Pieter Bellekens, Kees van der Sluijs, Lora Aroyo,...