Sciweavers

540 search results - page 75 / 108
» Exploiting the Combined Potential of Web Applications and We...
Sort
View
USS
2008
13 years 10 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
IJSWIS
2008
100views more  IJSWIS 2008»
13 years 7 months ago
Semantic-Based Bluetooth-RFID Interaction for Advanced Resource Discovery in Pervasive Contexts
We propose a novel object discovery framework integrating the application layer of Bluetooth and RFID standards. The approach is motivated and illustrated in an innovative u-comme...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
HPDC
2005
IEEE
14 years 1 months ago
Increasing application performance in virtual environments through run-time inference and adaptation
Virtual machine distributed computing greatly simplifies the use of widespread computing resources by lowering the abstraction, benefiting both resource providers and users. Tow...
Ananth I. Sundararaj, Ashish Gupta, Peter A. Dinda
JCIT
2007
132views more  JCIT 2007»
13 years 7 months ago
Analysis and Implementation of M-commerce in Education for Developing Countries (Uzbekistan case)
M-commerce is one of the ways IT can significantly contribute to boosting economy of the developing countries. M-commerce project has a high potential in the developing countries ...
Olga Yugay, Aleksey Semyonov, Il Seok Ko, Sarvar R...
USENIX
2004
13 years 9 months ago
Reliability and Security in the CoDeeN Content Distribution Network
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running distributed services that interact with other resources on the Web. The CoDeeN C...
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek S....