Sciweavers

297 search results - page 31 / 60
» Secure Code Generation for Web Applications
Sort
View
WORDS
2005
IEEE
15 years 3 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
EUROPKI
2009
Springer
14 years 7 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
CIKM
2008
Springer
14 years 11 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
OOPSLA
2005
Springer
15 years 3 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui
AGTIVE
2003
Springer
15 years 3 months ago
A Demo of OptimixJ
OptimixJ is a graph rewrite tool that generates Java code from rewrite specifications. Java classes are treated as graph schemas, enabling OptimixJ to extend legacy Java applicati...
Uwe Aßmann, Johan Lövdahl