Sciweavers

509 search results - page 14 / 102
» End-to-End Web Application Security
Sort
View
INTERNET
2002
134views more  INTERNET 2002»
13 years 8 months ago
Developing Secure Web Applications
David Scott, Richard Sharp
ITPRO
2010
56views more  ITPRO 2010»
13 years 6 months ago
Web-Application Security: From Reactive to Proactive
John R. Maguire, H. Gilbert Miller
JIPS
2010
162views more  JIPS 2010»
13 years 3 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
ESWS
2005
Springer
14 years 1 months ago
Enabling Real World Semantic Web Applications Through a Coordination Middleware
In a real world scenario Semantic Web applications must be capable to cope with the large scale, distributed, heterogeneous, unreliable and insecure environment of the World Wide W...
Robert Tolksdorf, Lyndon J. B. Nixon, Elena Paslar...
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
13 years 5 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam