Sciweavers

132 search results - page 14 / 27
» Symbolic security analysis of ruby-on-rails web applications
Sort
View
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
14 years 1 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
ECOWS
2007
Springer
13 years 9 months ago
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Sebastian Gajek, Lijun Liao, Bodo Möller, J&o...
ENTCS
2007
105views more  ENTCS 2007»
13 years 7 months ago
Narrowing and Rewriting Logic: from Foundations to Applications
Narrowing was originally introduced to solve equational E-unification problems. It has also been recognized as a key mechanism to unify functional and logic programming. In both ...
Santiago Escobar, José Meseguer, Prasanna T...
ESCIENCE
2006
IEEE
13 years 11 months ago
Jylab: A System for Portable Scientific Computing over Distributed Platforms
Jylab is a portable and flexible scientific computing system favoring extensibility. It provides a user with a scripting language and a core set of libraries implementing numerica...
Giorgios Kollias, Efstratios Gallopoulos
ISSTA
2012
ACM
11 years 10 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...