Sciweavers

1748 search results - page 70 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
LISP
2007
78views more  LISP 2007»
15 years 1 months ago
Implementation and use of the PLT scheme Web server
The PLT Scheme Web Server uses continuations to enable a natural, console-like program development style. We describe the implementation of the server and its use in the developmen...
Shriram Krishnamurthi, Peter Walton Hopkins, Jay A...
ICOIN
2001
Springer
15 years 6 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
15 years 1 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
AWIC
2003
Springer
15 years 7 months ago
Formalization of Web Design Patterns Using Ontologies
Design patterns have been enthusiastically embraced in the software engineering community as well as in the web community since they capture knowledge about how and when to apply a...
Susana Montero, Paloma Díaz, Ignacio Aedo
ISSRE
2003
IEEE
15 years 7 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock