Sciweavers

1175 search results - page 139 / 235
» Modeling web applications reacting to user behaviors
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
CHI
2010
ACM
15 years 4 months ago
A case study of micro-blogging in the enterprise: use, value, and related issues
This is a case study about the early adoption and use of micro-blogging in a Fortune 500 company. The study used several independent data sources: five months of empirical micro-b...
Jun Zhang, Yan Qu, Jane Cody, Yulingling Wu
EUROMICRO
1999
IEEE
15 years 2 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
VLDB
2008
ACM
170views Database» more  VLDB 2008»
15 years 10 months ago
A layered framework supporting personal information integration and application design for the semantic desktop
With the development of inexpensive storage devices, space usage is no longer a bottleneck for computer users. However, the increasingly large amount of personal information poses ...
Isabel F. Cruz, Huiyong Xiao
CCS
2008
ACM
14 years 12 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...