Sciweavers

1748 search results - page 148 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
OOPSLA
2007
Springer
15 years 9 months ago
Understanding programmer language
The use of bad names — names that are wrong, inconsistent or inconcise — hinder program comprehension. The root of the problem is that there is no mechanism for aligning the n...
Einar W. Høst
PPPJ
2006
ACM
15 years 9 months ago
Aranea: web framework construction and integration kit
Currently there exist dozens of web controller frameworks that are incompatible, but at the same time have large portions of overlapping functionality that is implemented over and...
Oleg Mürk, Jevgeni Kabanov
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
15 years 9 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 8 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
CCS
2011
ACM
14 years 3 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...