Sciweavers

298 search results - page 26 / 60
» Secure Web Application Development and Global Regulation
Sort
View
CCS
2008
ACM
13 years 9 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
OSDI
2008
ACM
14 years 8 months ago
Leveraging Legacy Code to Deploy Desktop Applications on the Web
Xax is a browser plugin model that enables developers to leverage existing tools, libraries, and entire programs to deliver feature-rich applications on the web. Xax employs a nov...
John R. Douceur, Jeremy Elson, Jon Howell, Jacob R...
CCS
2008
ACM
13 years 9 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
WORDS
2005
IEEE
14 years 1 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
IC
2001
13 years 9 months ago
The WebShop E-Commerce Framework
- This paper presents an e-commerce framework called WebShop, which was developed by the authors for the purpose of demonstrating the use of UML and the UML-F in the domain of Web ...
Marcus Fontoura, Wolfgang Pree, Bernhard Rumpe