Sciweavers

QSIC
2007
IEEE
13 years 10 months ago
Learning Effective Oracle Comparator Combinations for Web Applications
Web application testers need automated, effective approaches to validate the test results of complex, evolving web applications. In previous work, we developed a suite of automate...
Sara Sprenkle, Emily Hill, Lori L. Pollock
IMSCCS
2007
IEEE
13 years 11 months ago
An On-line MathML Editing Tool for Web Applications
MathEdit [23] is a browser-based tool implemented in JavaScript that provides a convenient and intuitive graphical user interface for creating and editing mathematical expressions...
Wei Su, Paul S. Wang, Lian Li
AINA
2007
IEEE
13 years 11 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
ACSAC
2007
IEEE
13 years 11 months ago
Secure Input for Web Applications
The web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the web. Although the web is ...
Martin Szydlowski, Christopher Kruegel, Engin Kird...
WISE
2008
Springer
13 years 11 months ago
Requirements for Rich Internet Application Design Methodologies
Rich Internet Applications (RIAs) are quickly becoming the de facto standard for interactive web applications on the Internet, featuring rich interfaces that increase user usabilit...
Jevon M. Wright, Jens Dietrich
VL
2008
IEEE
105views Visual Languages» more  VL 2008»
13 years 11 months ago
What's in a mashup? And why? Studying the perceptions of web-active end users
Mashups – web applications that integrate multiple data sources or APIs into one interface – have attracted considerable attention in recent years. The availability of web-bas...
Nan Zang, Mary Beth Rosson
ICST
2008
IEEE
13 years 11 months ago
Prioritizing User-Session-Based Test Cases for Web Applications Testing
Web applications have rapidly become a critical part of business for many organizations. However, increased usage of web applications has not been reciprocated with corresponding ...
Sreedevi Sampath, Renée C. Bryce, Gokulanan...
ICDCS
2008
IEEE
13 years 11 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
ACSAC
2008
IEEE
13 years 11 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
RAID
2009
Springer
13 years 11 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...