Sciweavers

3086 search results - page 390 / 618
» Developing Secure Web Applications
Sort
View
97
Voted
IPPS
2006
IEEE
15 years 8 months ago
The benefits of Java and Jini in the JGrid system
The Java language and platform have been considered by many as natural candidate for creating grid systems. The platform-independent runtime environment, safe and high-level langu...
Szabolcs Pota, Zoltan Juhasz
171
Voted
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
16 years 2 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher
HT
2000
ACM
15 years 7 months ago
Finding linking opportunities through relationship-based analysis
Many techniques exist for analyzing information domains in preparation for systems design. No systematic technique exists, however, for analyzing a system or domain in terms of it...
Joonhee Yoo, Michael Bieber
99
Voted
ICSE
2009
IEEE-ACM
15 years 9 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
108
Voted
CSE
2009
IEEE
15 years 9 months ago
Enabling Privacy as a Fundamental Construct for Social Networks
The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class of Internet applications called social software. These systems focus on leveragi...
E. Michael Maximilien, Tyrone Grandison, Kun Liu, ...