Sciweavers

ISTA
2008
13 years 6 months ago
Aspect Based Conceptual Modelling of Web Applications
Though there are many Web application modelling approches these are aimed at assiting the implmentaion process. There are many benefits in creating a conceptual model of the Web ap...
Athula Ginige
HCI
2007
13 years 6 months ago
ZEUS - Zoomable Explorative User Interface for Searching and Object Presentation
In this paper we describe a first version of ZEUS, a web application that combines browsing, searching and object presentation. With the zooming and panning based navigation concep...
Fredrik Gundelsweiler, Thomas Memmel, Harald Reite...
DIMVA
2008
13 years 6 months ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
DAIS
2007
13 years 6 months ago
Towards Context-Aware Web Applications
In order to guarantee certain levels of QoS, a Web application needs to adapt itself to different execution contexts. However, because of the lack of coordination support in Web p...
Po-Hao Chang, Gul Agha
DIMVA
2010
13 years 6 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
CISSE
2008
Springer
13 years 6 months ago
Ontology-Based Web Application Testing
Testing Web applications is still a challenging work which can greatly benefit from test automation techniques. In this paper, we focus on using ontologies as a means of test autom...
Samad Paydar, Mohsen Kahani
CAISE
2008
Springer
13 years 6 months ago
Guidance in Web Applications Design
Abstract. The paper introduces a new situational method for Web applications design. The purpose of the approach is to respond to the following limits of web development methods: t...
Semia Sonia Selmi, Naoufel Kraïem, Henda Hajj...
FMCO
2006
Springer
135views Formal Methods» more  FMCO 2006»
13 years 8 months ago
Links: Web Programming Without Tiers
Links is a programming language for web applications that generates code for all three tiers of a web application from a single source, compiling into JavaScript to run on the clie...
Ezra Cooper, Sam Lindley, Philip Wadler, Jeremy Ya...
DSN
2004
IEEE
13 years 8 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
CCS
2006
ACM
13 years 8 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...