Sciweavers

867 search results - page 98 / 174
» Secure Input for Web Applications
Sort
View
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 2 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
WWW
2011
ACM
13 years 4 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
SACMAT
2011
ACM
12 years 12 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
EMISA
2004
Springer
14 years 2 months ago
On the Modeling of Correct Service Flows with BPEL4WS
: Frameworks for composing Web Services offer a promising approach for realizing enterprise-wide and cross-organizational business applications. With BPEL4WS a powerful composition...
Manfred Reichert, Stefanie Rinderle, Peter Dadam
COOPIS
2000
IEEE
14 years 1 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...