Sciweavers

297 search results - page 38 / 60
» Secure Code Generation for Web Applications
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
IPPS
2003
IEEE
15 years 3 months ago
A Web Service-Based Experiment Management System for the Grid
We have developed the ZENTURIO experiment management system for performance studies, parameter studies, and software testing of parallel applications on cluster and Grid architect...
Radu Prodan, Thomas Fahringer
BMCBI
2005
120views more  BMCBI 2005»
14 years 9 months ago
SpectralNET - an application for spectral graph analysis and visualization
Background: Graph theory provides a computational framework for modeling a variety of datasets including those emerging from genomics, proteomics, and chemical genetics. Networks ...
Joshua J. Forman, Paul A. Clemons, Stuart L. Schre...
DBSEC
2006
124views Database» more  DBSEC 2006»
14 years 11 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
CORR
2008
Springer
111views Education» more  CORR 2008»
14 years 9 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet