Sciweavers

108 search results - page 7 / 22
» Securely Replicated Web Documents
Sort
View
ICSOC
2007
Springer
14 years 1 months ago
Byzantine Fault Tolerant Coordination for Web Services Atomic Transactions
Abstract. In this paper, we present the mechanisms needed for Byzantine fault tolerant coordination of Web services atomic transactions. The mechanisms have been incorporated into ...
Wenbing Zhao
CCS
2011
ACM
12 years 7 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
CCS
2010
ACM
13 years 6 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
13 years 11 months ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann
WCE
2007
13 years 8 months ago
Beyond Web Intermediaries: A Framework for Securing Digital Content on Client Systems
—The move to begin to place liabilities for copyright violations on internet intermediaries such as ISPs and Cyber Cafes as a result of contents allowed through their networks is...
Stella C. Chiemeke, Olumide B. Longe