Sciweavers

1044 search results - page 39 / 209
» Engineering Web Applications Using Roles
Sort
View
METRICS
2002
IEEE
14 years 1 months ago
A Generic Model and Tool Support for Assessing and Improving Web Processes
Process assessment or process improvement is usually not considered in the context of Web applications, and the differences between Web applications and traditional applications a...
Daniel Rodríguez, Rachel Harrison, Manoranj...
COMPSAC
2004
IEEE
14 years 17 days ago
Web Application Bypass Testing
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Jeff Offutt, Ye Wu, Xiaochen Du, Hong Huang
SACMAT
2010
ACM
13 years 7 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
SACMAT
2010
ACM
14 years 1 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
SERP
2010
13 years 6 months ago
The Viability of UML Models in Small Web Applications
As the use of online business systems increase so does the need to produce more efficient and less error prone web based Modeling is a core abstraction mechanism used to manage co...
Jason Dudley, Devon Simmonds