Sciweavers

401 search results - page 37 / 81
» Web Application Bypass Testing
Sort
View
ICSE
2008
IEEE-ACM
16 years 2 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
111
Voted
WWW
2008
ACM
16 years 3 months ago
An initial investigation on evaluating semantic web instance data
Many emerging semantic web applications include ontologies from one set of authors and instance data from another (often much larger) set of authors. Often ontologies are reused a...
Li Ding, Jiao Tao, Deborah L. McGuinness
114
Voted
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
15 years 2 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...
SIGMOD
2001
ACM
160views Database» more  SIGMOD 2001»
16 years 2 months ago
Adaptive Precision Setting for Cached Approximate Values
Caching approximate values instead of exact values presents an opportunity for performance gains in exchange for decreased precision. To maximize the performance improvement, cach...
Chris Olston, Boon Thau Loo, Jennifer Widom
132
Voted
SISW
2005
IEEE
15 years 8 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash