Sciweavers

401 search results - page 37 / 81
» Web Application Bypass Testing
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
WWW
2008
ACM
14 years 10 months ago
An initial investigation on evaluating semantic web instance data
Many emerging semantic web applications include ontologies from one set of authors and instance data from another (often much larger) set of authors. Often ontologies are reused a...
Li Ding, Jiao Tao, Deborah L. McGuinness
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
13 years 9 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...
SIGMOD
2001
ACM
160views Database» more  SIGMOD 2001»
14 years 9 months ago
Adaptive Precision Setting for Cached Approximate Values
Caching approximate values instead of exact values presents an opportunity for performance gains in exchange for decreased precision. To maximize the performance improvement, cach...
Chris Olston, Boon Thau Loo, Jennifer Widom
SISW
2005
IEEE
14 years 3 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash