Sciweavers

1685 search results - page 304 / 337
» Guidance in Web Applications Design
Sort
View
ASWEC
2006
IEEE
15 years 10 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
APLAS
2010
ACM
15 years 4 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
WWW
2005
ACM
16 years 5 months ago
Hierarchical substring caching for efficient content distribution to low-bandwidth clients
While overall bandwidth in the internet has grown rapidly over the last few years, and an increasing number of clients enjoy broadband connectivity, many others still access the i...
Utku Irmak, Torsten Suel
WWW
2005
ACM
16 years 5 months ago
Fully automatic wrapper generation for search engines
When a query is submitted to a search engine, the search engine returns a dynamically generated result page containing the result records, each of which usually consists of a link...
Hongkun Zhao, Weiyi Meng, Zonghuan Wu, Vijay Ragha...
WWW
2005
ACM
16 years 5 months ago
A personalized search engine based on web-snippet hierarchical clustering
In this paper we propose a hierarchical clustering engine, called SnakeT, that is able to organize on-the-fly the search results drawn from 16 commodity search engines into a hier...
Paolo Ferragina, Antonio Gulli