Sciweavers

1748 search results - page 89 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
128
Voted
ICALP
2005
Springer
15 years 9 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
115
Voted
TAICPART
2010
IEEE
166views Education» more  TAICPART 2010»
15 years 1 months ago
Linguistic Security Testing for Text Communication Protocols
We introduce a new Syntax-based Security Testing (SST) framework that uses a protocol specification to perform security testing on text-based communication protocols. A protocol sp...
Ben W. Y. Kam, Thomas R. Dean
KBSE
2010
IEEE
15 years 1 months ago
MiTV: multiple-implementation testing of user-input validators for web applications
User-input validators play an essential role in guarding a web application against application-level attacks. Hence, the security of the web application can be compromised by defe...
Kunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, N...
116
Voted
IFIP
2009
Springer
15 years 10 months ago
Specifying and Modelling Secure Channels in Strand Spaces
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol ed on top of a secure transport protocol. The model abst...
Allaa Kamil, Gavin Lowe
137
Voted
ISSRE
2006
IEEE
15 years 9 months ago
Web Application Testing with Customized Test Requirements - An Experimental Comparison Study
Test suite reduction uses test requirement coverage to determine if the reduced test suite maintains the original suite’s requirement coverage. Based on observations from our pr...
Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lor...