Sciweavers

449 search results - page 26 / 90
» Protecting the Hosted Application Server
Sort
View
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...

Publication
311views
15 years 7 months ago
Towards Privacy-Aware Location-Based Database Servers
The wide spread of location-based services results in a strong market for location-detection devices (e.g., GPS-like devices, RFIDs, handheld devices, and cellular phones). Example...
Mohamed F. Mokbel
CISIS
2009
IEEE
14 years 2 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
14 years 1 months ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
14 years 4 days ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle