Sciweavers

1943 search results - page 181 / 389
» Web application security engineering
Sort
View
ICSM
2002
IEEE
15 years 8 months ago
From Legacy to Web through Interaction Modeling
In the context of the CelLEST project, we have been investigating the problem of reengineering and reusing the services provided by legacy applications, running on mainframe hosts...
Eleni Stroulia, Mohammad El-Ramly, Paul G. Sorenso...
ICSM
2005
IEEE
15 years 8 months ago
Appletizing: Running Legacy Java Code Remotely from a Web Browser
Adding distributed capabilities to existing programs has come to the forefront of software evolution. As a standard Java distributed technology, applets offer the advantages of be...
Eli Tilevich, Yannis Smaragdakis, Marcus Handte
ACSAC
2010
IEEE
15 years 1 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
EMSOFT
2005
Springer
15 years 8 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz