Sciweavers

3086 search results - page 437 / 618
» Developing Secure Web Applications
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
ASWEC
2006
IEEE
14 years 4 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
CSREAEEE
2006
117views Business» more  CSREAEEE 2006»
13 years 11 months ago
Open Source Implementation of the NIST Healthcare Standards Landscape
-- The NIST HealthCare Standards Landscape (HCSL) is a project to develop and demonstrate a web-based repository of information (called "Landscape") on healthcare informa...
Hai Tang, Roy Morgan, Thomas Rhodes, Clement Ridor...
WWW
2001
ACM
14 years 11 months ago
Enabling full service surrogates using the portable channel representation
The simplicity of the basic client/server model of Web services led quickly to its widespread adoption, but also to scalability and performance problems. The technological respons...
Micah Beck, Terry Moore, Leif Abrahamsson, Christo...
SOSP
2005
ACM
14 years 7 months ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh