Sciweavers

776 search results - page 24 / 156
» Securing user inputs for the web
Sort
View
SWWS
2008
13 years 10 months ago
A User Guided Iterative Alignment Approach for Ontology Mapping
- The future of the Semantic Web envisions an interconnected network of data and systems where software agents can communicate seamlessly to perform complicated tasks with limited ...
Danny Chen, John Lastusky, James Starz, Stephen Ho...
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
13 years 6 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
COMPSAC
2008
IEEE
14 years 3 months ago
Modeling by Form Transformation for End-User Initiative Development
2. Previous studies on end-user computing The development of Web applications should be supported by business professionals themselves since Web applications must be modified frequ...
Takeshi Chusho, Noriyuki Yagi
SAC
2009
ACM
14 years 3 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
GI
2007
Springer
14 years 3 months ago
Developing a Security Event Management System for Intermodal Transport
: Bremen, Federal State of Germany, is planning to set up a headquarter for GMES - Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics an...
Rainer Müller