Sciweavers

144 search results - page 5 / 29
» Interactive Analysis of Attack Graphs Using Relational Queri...
Sort
View
EDO
2005
Springer
14 years 1 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
CINQ
2004
Springer
182views Database» more  CINQ 2004»
13 years 11 months ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...
SSDBM
2009
IEEE
77views Database» more  SSDBM 2009»
14 years 2 months ago
Query Recommendations for Interactive Database Exploration
Abstract. Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenar...
Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis P...
PODS
2010
ACM
213views Database» more  PODS 2010»
14 years 22 days ago
Expressive languages for path queries over graph-structured data
For many problems arising in the setting of graph querying (such as finding semantic associations in RDF graphs, exact and approximate pattern matching, sequence alignment, etc.)...
Pablo Barceló, Carlos A. Hurtado, Leonid Li...
LICS
2012
IEEE
11 years 10 months ago
Graph Logics with Rational Relations and the Generalized Intersection Problem
Abstract—We investigate some basic questions about the interaction of regular and rational relations on words. The primary motivation comes from the study of logics for querying ...
Pablo Barceló, Diego Figueira, Leonid Libki...