Sciweavers

1943 search results - page 101 / 389
» Web application security engineering
Sort
View
WWW
2004
ACM
15 years 10 months ago
Semantical Descriptions of Models for Web Design
The use of semantic web languages brings a number of advantages for web engineering methodologies. In this paper we present how in the Hera methodology the design models benefit f...
Peter Barna, Geert-Jan Houben, Flavius Frasincar, ...
IADIS
2004
14 years 11 months ago
Pattern definition to refine navigation structure in hypermedia/Web applications
When building Hypermedia/Web Applications, (different) designers are often faced with the same problems over and over again. Those recurring problems soon yield elegant solutions,...
Sven Casteleyn, Irene Garrigós, Peter Pless...
SCAM
2005
IEEE
15 years 3 months ago
Transforming Embedded Java Code into Custom Tags
When a new technology is introduced, the migration of existing applications to the new technology must be carefully considered. Automation can make some migrations feasible that o...
Shannon Xu, Thomas R. Dean
ICSE
2008
IEEE-ACM
15 years 10 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 4 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....