Sciweavers

10 search results - page 1 / 2
» Tailored Shielding and Bypass Testing of Web Applications
Sort
View
ICST
2011
IEEE
12 years 8 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
COMPSAC
2004
IEEE
13 years 8 months ago
Web Application Bypass Testing
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Jeff Offutt, Ye Wu, Xiaochen Du, Hong Huang
DSN
2007
IEEE
13 years 11 months ago
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services
New versions of existing large-scale web services such as Passport.com© have to go through rigorous performance evaluations in order to ensure a high degree of availability. Perf...
Marcelo De Barros, Jing Shiau, Chen Shang, Kenton ...
FLAIRS
2008
13 years 7 months ago
Alignment of Heterogeneous Ontologies: A Practical Approach to Testing for Similarities and Discrepancies
Ontology alignment is regarded as one of the core tasks in many Web services. It is concerned with finding the correspondences between separate ontologies by identifying concepts ...
Neli P. Zlatareva, Maria Nisheva
ACSAC
2001
IEEE
13 years 8 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon