Sciweavers

448 search results - page 27 / 90
» Self-optimization of secure web services
Sort
View
WWW
2008
ACM
14 years 9 months ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
GI
2007
Springer
14 years 2 months ago
Developing a Security Event Management System for Intermodal Transport
: Bremen, Federal State of Germany, is planning to set up a headquarter for GMES - Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics an...
Rainer Müller
ICWS
2008
IEEE
13 years 10 months ago
A Dependable Infrastructure for Cooperative Web Services Coordination
A current trend in the web services community is to define coordination mechanisms to execute collaborative tasks involving multiple organizations. Following this tendency, this w...
Eduardo Adílio Pelinson Alchieri, Alysson N...
BPM
2005
Springer
173views Business» more  BPM 2005»
14 years 2 months ago
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...
Rainer Anzböck, Schahram Dustdar
CCS
2011
ACM
12 years 8 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker