Sciweavers

112 search results - page 15 / 23
» Web Development Evolution: The Assimilation of Web Engineeri...
Sort
View
SAC
2006
ACM
14 years 2 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
14 years 3 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
RE
2001
Springer
14 years 1 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
APSEC
2005
IEEE
14 years 2 months ago
Feature Analysis for Service-Oriented Reengineering
Web Services together with Service-Oriented Architectures (SOA) are playing an important role in the future of distributed computing, significantly impacting software development ...
Feng Chen, Shaoyun Li, William Cheng-Chung Chu