Sciweavers

168 search results - page 2 / 34
» Runtime Reconfiguration of J2EE Applications
Sort
View
CCS
2006
ACM
13 years 9 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
IJSSE
2010
121views more  IJSSE 2010»
13 years 3 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov
ATAL
2008
Springer
13 years 7 months ago
LS/ABPM - an agent-powered suite for goal-oriented autonomic BPM
In this paper we shortly describe the Living Systems Autonomic Business Process Management (LS/ABPM) software product. LS/ABPM is an integrated environment, based on J2EE, Eclipse...
Giovanni Rimassa, Martin E. Kernland, Roberto Ghiz...
MIDDLEWARE
2009
Springer
13 years 10 months ago
How to Keep Your Head above Water While Detecting Errors
Today’s distributed systems need runtime error detection to catch errors arising from software bugs, hardware errors, or unexpected operating conditions. A prominent class of err...
Ignacio Laguna, Fahad A. Arshad, David M. Grothe, ...
ASE
2006
110views more  ASE 2006»
13 years 5 months ago
Runtime recovery and manipulation of software architecture of component-based systems
Recently, more attention is paid to the researches and practices on how to use software architecture in software maintenance and evolution to reduce their complexity and cost. The ...
Gang Huang, Hong Mei, Fuqing Yang