Sciweavers

624 search results - page 48 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
ISSTA
2012
ACM
13 years 6 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
SACMAT
2009
ACM
15 years 10 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
ICDIM
2007
IEEE
15 years 10 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
LADC
2007
Springer
15 years 10 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
123
Voted
ECWEB
2005
Springer
102views ECommerce» more  ECWEB 2005»
15 years 9 months ago
Improving Web Design Methods with Architecture Modeling
Many approaches have been developed for modeling the functional aspects of Web applications, but there is a lack of a modeling language for their architectural concerns. This paper...
Santiago Meliá, Jaime Gómez, Nora Ko...