Sciweavers

SAC
2011
ACM
12 years 9 months ago
Reliable protection against session fixation attacks
The term ‘Session Fixation vulnerability’ subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack throu...
Martin Johns, Bastian Braun, Michael Schrank, Joac...
USS
2010
13 years 4 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
EUSAI
2007
Springer
13 years 8 months ago
A Compiler for the Smart Space
Developing applications for smart spaces is a challenging task. Most programming systems narrowly focus on the embedded computer infrastructure and neglect the spatial aspect of th...
Urs Bischoff, Gerd Kortuem
IRI
2003
IEEE
14 years 2 days ago
An Architectural Pattern For Adaptable Middleware Infrastructure
- Middleware technologies change so rapidly that designers must adapt existing software architectures to incorporate new emerging ones. This paper proposes tectural pattern and gui...
Arturo Sanchez, Jason Mitchell
KBSE
2006
IEEE
14 years 24 days ago
An Instant Message-Driven User Interface Framework for Thin Client Applications
Today, thin client applications often rely on the infrastructure of the WWW to deliver their user interfaces (UIs) to clients. While this approach does not require the deployment ...
Matthias Book, Volker Gruhn, Gerald Mucke
CHI
2007
ACM
14 years 7 months ago
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition
Sensors are becoming increasingly important in interaction design. Authoring a sensor-based interaction comprises three steps: choosing and connecting the appropriate hardware, cr...
Björn Hartmann, Leith Abdulla, Manas Mittal, ...