Sciweavers

6844 search results - page 1099 / 1369
» Web Service Security
Sort
View
USS
2008
15 years 6 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
147
Voted
WWW
2005
ACM
16 years 5 months ago
Fully automatic wrapper generation for search engines
When a query is submitted to a search engine, the search engine returns a dynamically generated result page containing the result records, each of which usually consists of a link...
Hongkun Zhao, Weiyi Meng, Zonghuan Wu, Vijay Ragha...
W4A
2009
ACM
15 years 11 months ago
Accessibility perspectives on enabling South African sign language in the South African national accessibility portal
Persons with disabilities are often marginalised from economy and society due to the lack of access to disability related information and services. Through the use of assistive te...
Louis Coetzee, Guillaume J.-L. Olivrin, Ilse Vivie...
132
Voted
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 11 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
IEEESCC
2007
IEEE
15 years 11 months ago
Swift: Fast, Reliable, Loosely Coupled Parallel Computation
A common pattern in scientific computing involves the execution of many tasks that are coupled only in the sense that the output of one may be passed as input to one or more other...
Yong Zhao, Mihael Hategan, Ben Clifford, Ian T. Fo...
« Prev « First page 1099 / 1369 Last » Next »