Sciweavers

4731 search results - page 61 / 947
» Securing Interactive Programs
Sort
View
POPL
2006
ACM
14 years 9 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
GPCE
2005
Springer
14 years 2 months ago
A Generative Programming Approach to Interactive Information Retrieval: Insights and Experiences
We describe the application of generative programming to a problem in interactive information retrieval. The particular interactive information retrieval problem we study is the su...
Saverio Perugini, Naren Ramakrishnan
CHI
2002
ACM
14 years 9 months ago
Physical programming: designing tools for children to create physical interactive environments
Physical interactive environments can come in many forms: museum installations, amusement parks, experimental theaters, and more. Programming these environments has historically b...
Jaime Montemayor, Allison Druin, Allison Farber, S...
CHI
2009
ACM
14 years 3 months ago
Growing up programming: democratizing the creation of dynamic, interactive media
Young people interact with games, animations, and simulations all of the time. But few of them are able to create interactive media. The obstacle: traditional programming language...
Mitchel Resnick, Mary Flanagan, Caitlin Kelleher, ...
IACR
2011
105views more  IACR 2011»
12 years 8 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi