Sciweavers

1527 search results - page 100 / 306
» A Survey of Web Security
Sort
View
ACSAC
2002
IEEE
15 years 4 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
IADIS
2003
15 years 1 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
WSFM
2007
Springer
15 years 5 months ago
Towards a Theory of Web Service Choreographies
A fundamental promise of service oriented architecture (SOA) lies in the ease of integrating sharable information, processes, and other resources through interactions among the sha...
Jianwen Su, Tevfik Bultan, Xiang Fu, Xiangpeng Zha...
CIDR
2003
145views Algorithms» more  CIDR 2003»
15 years 1 months ago
Distributed Computing with BEA WebLogic Server
This paper surveys distributed computing techniques used in the implementation of BEA WebLogic Server. It discusses how application servers provide a distributed transactional inf...
Dean Jacobs
WWW
2010
ACM
15 years 6 months ago
Web search/browse log mining: challenges, methods, and applications
Huge amounts of search and browse log data has been accumulated in various search engines. Such massive search/browse log data, on the one hand, provides great opportunities to mi...
Daxin Jiang, Jian Pei, Hang Li