Sciweavers

1098 search results - page 128 / 220
» Usage-Centered Engineering for Web Applications
Sort
View
126
Voted
ISSRE
2008
IEEE
15 years 10 months ago
Automated Fix Generator for SQL Injection Attacks
A critical problem facing today’s internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input valida...
Fred Dysart, Mark Sherriff
110
Voted
PPPJ
2003
ACM
15 years 9 months ago
Transparent Java standard extensions with native libraries on multiple platforms
Java programs that utilize standard extensions with native libraries are problematic since the extensions are platform dependent. We present general methods that make such program...
Pierre Wijkman, Mitra Wijkman, Suru Dissanaike
161
Voted
PVLDB
2010
128views more  PVLDB 2010»
14 years 10 months ago
Searching Workflows with Hierarchical Views
Workflows are prevalent in diverse applications, which can be scientific experiments, business processes, web services, or recipes. With the dramatically growing number of workflo...
Ziyang Liu, Qihong Shao, Yi Chen
132
Voted
EDBT
2009
ACM
144views Database» more  EDBT 2009»
15 years 7 months ago
Efficient maintenance techniques for views over active documents
Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when moni...
Serge Abiteboul, Pierre Bourhis, Bogdan Marinoiu
126
Voted
KBSE
2005
IEEE
15 years 9 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso