Sciweavers

591 search results - page 47 / 119
» MDA Transformations Applied to Web Application Development
Sort
View
DEXAW
2005
IEEE
108views Database» more  DEXAW 2005»
15 years 7 months ago
Developing an Ontology for the Domain Name System
Ontologies provide a means of modelling and representing a knowledge domain. Such representation, already used in purpose-built distributed information systems, can also be of gre...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 8 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
COMPSAC
2004
IEEE
15 years 5 months ago
Cooperative Agent Approach to Quality Assurance and Testing Web Software
This paper applies Lehman's theory of software evolution to analyse the characteristics of web-based applications and identifies the essences and incidents that cause difficu...
Hong Zhu
124
Voted
TSE
2008
236views more  TSE 2008»
15 years 1 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
SOUPS
2009
ACM
15 years 8 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner