Sciweavers

JIPS
2010
162views more  JIPS 2010»
13 years 6 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
TSE
2011
180views more  TSE 2011»
13 years 6 months ago
Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
—Event-Driven Software (EDS) can change state based on incoming events; common examples are GUI and web applications. These EDS pose a challenge to testing because there are a la...
Renée C. Bryce, Sreedevi Sampath, Atif M. M...
CSMR
2010
IEEE
13 years 6 months ago
Automating Coverage Metrics for Dynamic Web Applications
Abstract--Building comprehensive test suites for web applications poses new challenges in software testing. Coverage criteria used for traditional systems to assess the quality of ...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
FGCS
2011
149views more  FGCS 2011»
13 years 6 months ago
Adaptive resource provisioning for read intensive multi-tier applications in the cloud
A Service-Level Agreement (SLA) provides surety for specific quality attributes to the consumers of services. However, current SLAs offered by cloud infrastructure providers do ...
Waheed Iqbal, Matthew N. Dailey, David Carrera, Pa...
COLING
2010
13 years 6 months ago
Cloud Computing for Linguists
The system presented is a web application designed to aid linguistic research with data collection and online publishing. It is a service mainly for linguists and language experts...
Dorothee Beermann, Pavel Mihaylov
ISF
2010
273views more  ISF 2010»
13 years 8 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 9 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
ESEM
2009
ACM
13 years 9 months ago
Security of open source web applications
In an empirical study of fourteen widely used open source PHP web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilit...
James Walden, Maureen Doyle, Grant A. Welch, Micha...
USS
2010
13 years 9 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
SICHERHEIT
2010
13 years 9 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller