Sciweavers

1943 search results - page 116 / 389
» Web application security engineering
Sort
View
WWW
2010
ACM
15 years 5 months ago
Web search/browse log mining: challenges, methods, and applications
Huge amounts of search and browse log data has been accumulated in various search engines. Such massive search/browse log data, on the one hand, provides great opportunities to mi...
Daxin Jiang, Jian Pei, Hang Li
EUROSYS
2007
ACM
15 years 7 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
COMPSAC
2009
IEEE
15 years 4 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
METRICS
2003
IEEE
15 years 3 months ago
Estimating the Design Effort of Web Applications
Our study focuses on the effort needed for designing Web applications. The effort required for the design phase is an important part of the total development effort of a Web appli...
Luciano Baresi, Sandro Morasca, Paolo Paolini
CMG
2000
14 years 11 months ago
Building Responsive and Scalable Web Applications
Responsiveness and scalability are important quality-of-service attributes for Web applications. Web sites that are slow, either because of poor responsiveness or lack of scalabil...
Connie U. Smith, Lloyd G. Williams