Sciweavers

509 search results - page 64 / 102
» End-to-End Web Application Security
Sort
View
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 10 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 3 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
DIMVA
2008
13 years 10 months ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
WWW
2001
ACM
14 years 9 months ago
XML Key Management Specification (XKMS)
The XML Key Management Specification (XKMS) is described. XKMS is a Web Service that provides an interface between an XML application and a Public Key Infrastructure (PKI). XKMS g...
Phillip M. Hallam-Baker, Warwick Ford
MUE
2007
IEEE
149views Multimedia» more  MUE 2007»
14 years 2 months ago
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission
Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication ...
Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam