Sciweavers

1748 search results - page 98 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
153
Voted
JSS
2006
111views more  JSS 2006»
15 years 3 months ago
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog
Web and peer-to-peer systems have emerged as popular areas in distributed computing, and their integrated usage permits the benefits of both to be exploited. While much work in th...
Seng Wai Loke
DSN
2000
IEEE
15 years 7 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur

Book
267views
16 years 11 months ago
Advanced Programming for the Java 2 Platform
"As an experienced developer on the Java platform, you undoubtedly know how fast moving and comprehensive the platform is. Its many application programming interfaces (APIs) p...
Calvin Austin and Monica Pawlan
122
Voted
CCS
2008
ACM
15 years 5 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
189
Voted
SIGMOD
2006
ACM
145views Database» more  SIGMOD 2006»
16 years 3 months ago
Automatic client-server partitioning of data-driven web applications
Current application development tools provide completely different programming models for the application server (e.g., Java and J2EE) and the client web browser (e.g., JavaScript...
Nicholas Gerner, Fan Yang 0002, Alan J. Demers, Jo...