Sciweavers

3086 search results - page 133 / 618
» Developing Secure Web Applications
Sort
View
105
Voted
HASE
2007
IEEE
15 years 8 months ago
Analytic Model for Web Anomalies Classification
In this paper, an analytic technique is proposed to improve the dynamic web application quality and reliability. The technique integrates orthogonal defect classification (ODC), a...
Nasser Alaeddine, Jeff Tian
ICWE
2007
Springer
15 years 8 months ago
Bridging the Gap between BPMN and WS-BPEL. M2M Transformations in Practice
Abstract. The Web is being consolidating as the main platform for the development of applications. Moreover, these applications are not conceived just as isolated systems. This fac...
Pau Giner, Victoria Torres, Vicente Pelechano
122
Voted
EUROMICRO
1999
IEEE
15 years 7 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
DSN
2004
IEEE
15 years 6 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
136
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 2 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks