Sciweavers

3086 search results - page 135 / 618
» Developing Secure Web Applications
Sort
View
98
Voted
SIGOPSE
1996
ACM
15 years 6 months ago
The persistent relevance of the local operating system to global applications
The growth and popularity of loosely-coupled distributed systems such as the World Wide Web and the touting of Java-based systems as the solution to the issues of software mainten...
Jay Lepreau, Bryan Ford, Mike Hibler
99
Voted
ACL
2010
15 years 20 days ago
WebLicht: Web-Based LRT Services for German
This software demonstration presents WebLicht (short for: Web-Based Linguistic Chaining Tool), a webbased service environment for the integration and use of language resources and...
Erhard W. Hinrichs, Marie Hinrichs, Thomas Zastrow
106
Voted
FASE
2009
Springer
15 years 9 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
112
Voted
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 9 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
137
Voted
IMCS
2007
78views more  IMCS 2007»
15 years 2 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri