Sciweavers

5343 search results - page 403 / 1069
» Keyword programming in java
Sort
View
CCS
2010
ACM
15 years 4 months ago
Protecting browsers from cross-origin CSS attacks
Cross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defen...
Lin-Shung Huang, Zack Weinberg, Chris Evans, Colli...
CLEIEJ
2002
89views more  CLEIEJ 2002»
15 years 3 months ago
JaCoWeb Security - A CORBA Security Discretionary Prototype
This paper presents a CORBA Security discretionary prototype developed in the context of JaCoWeb Security Project. JaCoWeb Security Project is developing an authorization scheme f...
Carla Merkle Westphall, Joni da Silva Fraga, Miche...
CORR
1998
Springer
100views Education» more  CORR 1998»
15 years 3 months ago
Push vs. Pull in Web-Based Network Management
In this paper, we build on the concept of embedded management application, proposed by Wellens and Auerbach, and present two models of network management application designs that ...
Jean-Philippe Martin-Flatin
122
Voted
JVCA
2002
161views more  JVCA 2002»
15 years 3 months ago
Building 3D anatomical scenes on the Web
We propose a new service for building user-defined 3D anatomic structures on the Web. The Web server is connected to a data base storing more than 1000 3D anatomic models reconstr...
F. Evesque, Sebastian Gerlach, Roger D. Hersch
ICFP
2006
ACM
16 years 4 months ago
Type-theoretic design patterns
The development of design patterns in object-oriented programming aims at capturing good software design in a re-usable generic form. However, design patterns are not expressible ...
Ondrej Rypacek, Roland Carl Backhouse, Henrik Nils...