Sciweavers

509 search results - page 29 / 102
» End-to-End Web Application Security
Sort
View
WWW
2002
ACM
14 years 9 months ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp
COOTS
1998
13 years 9 months ago
Java Transactions for the Internet
The Web frequently suffers from failures which affect the performance and consistency of applications run over it. An important fault-tolerance technique is the use of atomic tran...
Mark C. Little, Santosh K. Shrivastava
TLDI
2009
ACM
108views Formal Methods» more  TLDI 2009»
14 years 5 months ago
Secure compilation of a multi-tier web language
Storing state in the client tier (in forms or cookies, for example) improves the efficiency of a web application, but it also renders the secrecy and integrity of stored data vul...
Ioannis G. Baltopoulos, Andrew D. Gordon
SAC
2010
ACM
14 years 3 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
IEEEARES
2007
IEEE
14 years 2 months ago
Secure Software Development through Coding Conventions and Frameworks
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Takao Okubo, Hidehiko Tanaka