Sciweavers

72 search results - page 11 / 15
» Towards a Mechanism for Discretionary Overriding of Access C...
Sort
View
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
ICSE
2003
IEEE-ACM
14 years 7 months ago
RUPi - A Unified Process that Integrates Human-Computer Interaction and Software Engineering
This research has the main objective of presenting a study on the areas of Human-Computer Interaction (HCI) and Software Engineering (SE), focusing on the importance of integratin...
Kênia Soares Sousa, Elizabeth Furtado
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 1 months ago
A Session-Initiation-Protocol-Based Middleware for Multi-Application Management
Abstract—The deployment of multimedia services in nextgeneration networks is a challenge due to the high configuration complexity of the streaming process in different stationary...
Teodora Guenkova-Luy, Holger Schmidt, Andreas Scho...
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
VRCAI
2009
ACM
14 years 2 months ago
Towards Virtual Reality games
Game engines of cinematic quality, broadband networking and advances in Virtual Reality (VR) technologies are setting the stage to allow players to have shared, “better-than-lif...
Andrei Sherstyuk, Dale Vincent, Anton Treskunov