Sciweavers

1044 search results - page 34 / 209
» Engineering Web Applications Using Roles
Sort
View
IJCAI
2003
13 years 10 months ago
Decidability of SHIQ with Complex Role Inclusion Axioms
Motivated by medical terminology applications, we investigate the decidability of the well known expressive DL, SHIQ, extended with role inclusion axioms (RIAs) of the form R ◦ ...
Ian Horrocks, Ulrike Sattler
EDOC
2006
IEEE
14 years 2 months ago
Specifying and Controlling Multi-Channel Web Interfaces for Enterprise Applications
When building enterprise applications that need to be accessed through a variety of client devices, developers usually strive to implement most of the business logic device-indepen...
Matthias Book, Volker Gruhn
CCS
2008
ACM
13 years 10 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
WWW
2010
ACM
14 years 3 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
ISSRE
2010
IEEE
13 years 7 months ago
DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing
—Web 2.0 applications are increasing in popularity. However, they are also prone to errors because of their dynamic nature. This paper presents DoDOM, an automated system for tes...
Karthik Pattabiraman, Benjamin G. Zorn