Sciweavers

298 search results - page 39 / 60
» Secure Web Application Development and Global Regulation
Sort
View
166
Voted
SEC
2007
15 years 4 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
149
Voted
CCS
2008
ACM
15 years 4 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
143
Voted
APLAS
2010
ACM
15 years 3 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
118
Voted
CBMS
2007
IEEE
15 years 4 months ago
From Local Laboratory Data to Public Domain Database in Search of Indirect Association of Diseases: AJAX Based Gene Data Search
This paper presents an extensible schema for capturing laboratory gene variance data with its meta-data properties in a semi-structured environment. This paper also focuses on the...
Nawaz Khan, Ham Long, Shahedur Rahman, Tony Stockm...
112
Voted
ITPRO
2007
101views more  ITPRO 2007»
15 years 2 months ago
Beyond Search: Content Applications
Federation of Abstracting and Information Services presentation (“TheThomsonTransformation: Remaking a Global 500 Company,” http://www. nfais.org/TurnerNFAIS06.ppt). Now conten...
Stephen Buxton