Sciweavers

1748 search results - page 78 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
CBMS
2009
IEEE
15 years 10 months ago
HL7 healthcare information management using aspect-oriented programming
Given the heterogeneity of healthcare software systems, data from each system is often incompatible inhibiting interoperability. To enable the sharing and exchange of healthcare i...
Jennifer Munnelly, Siobhán Clarke
130
Voted
DIM
2009
ACM
15 years 10 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
160
Voted
ISSTA
2012
ACM
13 years 6 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
154
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
103
Voted
PERCOM
2009
ACM
15 years 10 months ago
Opening Pervasive Computing to the Masses Using the SEAP Middleware
— The increasing availability of sensing devices has made the possibility of context-aware pervasive computing applications real. However, constructing this software requires ext...
Seth Holloway, Drew Stovall, Jorge Lara-Garduno, C...