Sciweavers

776 search results - page 28 / 156
» Securing user inputs for the web
Sort
View
ICST
2011
IEEE
14 years 4 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
120
Voted
IMCS
2007
78views more  IMCS 2007»
15 years 12 days ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
98
Voted
WECWIS
2003
IEEE
90views ECommerce» more  WECWIS 2003»
15 years 5 months ago
A Web Agent for Automating E-Commerce Operations
The great amount of information that a user handles in their typical transactions on the Internet –identifiers, addresses, credit card numbers, among others-, makes it necessary...
Juan Raposo, Manuel Álvarez, Ángel V...
82
Voted
IPPS
2007
IEEE
15 years 6 months ago
Middleware and Performance Issues for Computational Finance Applications on Blue Gene/L
We discuss real-world case studies involving the implementation of a web services middleware tier for the IBM Blue Gene/L supercomputer to support financial business applications...
Thomas Phan, Ramesh Natarajan, Satoki Mitsumori, H...
101
Voted
IPPS
2005
IEEE
15 years 6 months ago
Securely Replicated Web Documents
In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delive...
Bogdan C. Popescu, Maarten van Steen, Bruno Crispo...