Sciweavers

249 search results - page 22 / 50
» Security of open source web applications
Sort
View
123
Voted
DSN
2004
IEEE
15 years 7 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
134
Voted
SAC
2009
ACM
15 years 10 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
115
Voted
IAT
2003
IEEE
15 years 8 months ago
Problem-solving in open environments
With the increasing use of the internet, many problemsolving tasks such as resource allocation, scheduling, planning, and configuration pose themselves in an open setting involvi...
Santiago Macho-Gonzalez, Boi Faltings
BSDCON
2003
15 years 4 months ago
An Automated Binary Security Update System for FreeBSD
With the present trend towards increased reliance upon computer systems, the provision and prompt application of security patches is becoming vital. Developers of all operating sy...
Colin Percival
117
Voted
BMCBI
2008
156views more  BMCBI 2008»
15 years 3 months ago
Chromhome: A rich internet application for accessing comparative chromosome homology maps
Background: Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is ...
Sridevi Nagarajan, Willem Rens, James Stalker, Ton...