Sciweavers

260 search results - page 46 / 52
» Semantic model checking security requirements for web servic...
Sort
View
MIDDLEWARE
2004
Springer
14 years 1 months ago
Developing and Managing Software Components in an Ontology-Based Application Server
Application servers provide many functionalities commonly needed in the development of a complex distributed application. So far, the functionalities have mostly been developed an...
Daniel Oberle, Andreas Eberhart, Steffen Staab, Ra...
SAFECOMP
2001
Springer
14 years 1 months ago
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems
Abstract. To ensure the consistency of database subsystems involved in communication systems (e.g., telephone systems), appropriate scheduled maintenance policies are necessary. Au...
Stefano Porcarelli, Felicita Di Giandomenico, Amin...
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
KBSE
2005
IEEE
14 years 2 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
CCS
2005
ACM
14 years 2 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone