Sciweavers

249 search results - page 29 / 50
» Validating a Web Service Security Abstraction by Typing
Sort
View
ICWE
2003
Springer
14 years 27 days ago
X-SHAAD: An XML Implementation for Hypermedia Systems Modeling through SHAAD
Abstract. In this paper we present an implementation using XML and Java (XSHAAD) based on a modular architecture of SHAAD to support a web-based Adaptive Hypermedia System. This ar...
David Mérida, Ramón Fabregat, Carlos...
POPL
2006
ACM
14 years 8 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
RAID
2005
Springer
14 years 1 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
ACMICEC
2005
ACM
156views ECommerce» more  ACMICEC 2005»
14 years 1 months ago
A web services-based business interactions manager to support electronic commerce applications
Electronic commerce applications (e-commerce) need connecting technologies to support the external, agreed-upon or flexible business processes. This requires a specification of th...
Youcef Baghdadi
ICEB
2004
152views Business» more  ICEB 2004»
13 years 9 months ago
A Multi-Agent System for E-Business Processes Monitoring in a Web-Based Environment
In this paper, we present a multi-agent system MAGS for the e-business processes monitoring in a web-based environment. We classify the types of agents in MAGS by their monitoring...
Xinyu Zhao, Cen Wu, Runjie Zhang, Chen Zhao, Zuoqu...