Sciweavers

1943 search results - page 123 / 389
» Web application security engineering
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 10 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
WWW
2004
ACM
15 years 10 months ago
Challenges and practices in deploying web acceleration solutions for distributed enterprise systems
For most Web-based applications, contents are created dynamically based on the current state of a business, such as product prices and inventory, stored in database systems. These...
Divyakant Agrawal, K. Selçuk Candan, Koji H...
CCS
2008
ACM
14 years 12 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
ICWS
2004
IEEE
14 years 11 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin
SIGOPSE
1996
ACM
15 years 2 months ago
The persistent relevance of the local operating system to global applications
The growth and popularity of loosely-coupled distributed systems such as the World Wide Web and the touting of Java-based systems as the solution to the issues of software mainten...
Jay Lepreau, Bryan Ford, Mike Hibler