Sciweavers

1895 search results - page 349 / 379
» Using ATL for Checking Models
Sort
View
ESORICS
2011
Springer
12 years 9 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
CAISE
2000
Springer
14 years 2 months ago
Design Principles for Application Integration
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Paul Johannesson, Erik Perjons
CIDR
2007
141views Algorithms» more  CIDR 2007»
13 years 11 months ago
Data-Driven Processing in Sensor Networks
Wireless sensor networks are poised to enable continuous data collection on unprecedented scales, in terms of area location and size, and frequency. This is a great boon to field...
Adam Silberstein, Gregory Filpus, Kamesh Munagala,...
ENTCS
2006
168views more  ENTCS 2006»
13 years 9 months ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...
TCAD
2008
90views more  TCAD 2008»
13 years 9 months ago
Application and Verification of Local Nonsemantic-Preserving Transformations in System Design
Due to the increasing abstraction gap between the initial system model and a final implementation, the verification of the respective models against each other is a formidable task...
Tarvo Raudvere, Ingo Sander, Axel Jantsch