Sciweavers

1943 search results - page 102 / 389
» Web application security engineering
Sort
View
68
Voted
LAWEB
2003
IEEE
15 years 3 months ago
Alternative Implementation Techniques for Web Text Visualization
We present an approach for building text visualizations that avoids using plug-ins or clients based on languages like Java. Instead we propose to make the search engine applicatio...
Omar Alonso, Ricardo A. Baeza-Yates
ICSE
2008
IEEE-ACM
15 years 10 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
WCRE
2003
IEEE
15 years 3 months ago
Reconstructing Software Architecture for J2EE Web Applications
In this paper we describe our approach to reconstructing the software architecture of J2EE web applications. We use the Siemens Four Views approach, separating the architecture in...
Minmin Han, Christine Hofmeister, Robert L. Nord
ICST
2011
IEEE
14 years 1 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
ACSAC
2000
IEEE
15 years 2 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky