Sciweavers

509 search results - page 60 / 102
» End-to-End Web Application Security
Sort
View
ESWS
2006
Springer
14 years 5 days ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
ACSAC
2010
IEEE
13 years 6 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
TELSYS
2010
154views more  TELSYS 2010»
13 years 3 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
ESORICS
2006
Springer
14 years 5 days ago
SessionSafe: Implementing XSS Immune Session Handling
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
Martin Johns
ATAL
2005
Springer
14 years 2 months ago
A secure architectural description language for agent systems
Multi-agent systems are now being considered a promising architectural approach for building Internet-based applications. One of the most critical and important aspects of softwar...
Haralambos Mouratidis, Manuel Kolp, Stéphan...