Sciweavers

1943 search results - page 112 / 389
» Web application security engineering
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
CSSE
2004
IEEE
14 years 9 months ago
Trustable B2C markets on the semantic web
Abstract. Semantic Web technologies will deeply influence the further development of the Internet Economy. A major challenge is, however, to find a practical solution for trust pro...
Robert Tolksdorf, Christian Bizer, Rainer Eckstein...
ICSE
2004
IEEE-ACM
15 years 10 months ago
Adding High Availability and Autonomic Behavior to Web Services
Rapid acceptance of the Web Services architecture promises to make it the most widely supported and popular object-oriented architecture to date. One consequence is that a wave of...
Kenneth P. Birman, Robbert van Renesse, Werner Vog...
CCS
2011
ACM
13 years 10 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
WWW
2008
ACM
15 years 10 months ago
Defection detection: predicting search engine switching
Searchers have a choice about which Web search engine they use when looking for information online. If they are unsuccessful on one engine, users may switch to a different engine ...
Allison P. Heath, Ryen W. White