Sciweavers

5722 search results - page 1051 / 1145
» Security Function Interactions
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 4 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
144
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
SIGSOFT
2004
ACM
16 years 3 months ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
WWW
2004
ACM
16 years 3 months ago
QoS computation and policing in dynamic web service selection
The emerging Service-Oriented Computing (SOC) paradigm promises to enable businesses and organizations to collaborate in an unprecedented way by means of standard web services. To...
Yutu Liu, Anne H. H. Ngu, Liangzhao Zeng
206
Voted
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
16 years 2 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
« Prev « First page 1051 / 1145 Last » Next »