Sciweavers

3086 search results - page 85 / 618
» Developing Secure Web Applications
Sort
View
ICOIN
2001
Springer
15 years 2 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
IEEEARES
2008
IEEE
15 years 4 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
HOTOS
2007
IEEE
15 years 1 months ago
Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications
AJAX-based web applications are enabling the next generation of rich, client-side web applications, but today's web application developers do not have the end-to-end visibili...
Emre Kiciman, Helen J. Wang
WER
2005
Springer
15 years 3 months ago
Using Task Descriptions for the Specification of Web Application Requirements
There are a significant number of proposals for modelling and developing Web Applications, but very few of them state rigorously how to elicit and represent requirements, and how t...
Pedro Valderas, Joan Fons, Vicente Pelechano
VEE
2009
ACM
246views Virtualization» more  VEE 2009»
15 years 4 months ago
Tracing for web 3.0: trace compilation for the next generation web applications
Today’s web applications are pushing the limits of modern web browsers. The emergence of the browser as the platform of choice for rich client-side applications has shifted the ...
Mason Chang, Edwin W. Smith, Rick Reitmaier, Micha...