Sciweavers

1943 search results - page 284 / 389
» Web application security engineering
Sort
View
ER
1998
Springer
123views Database» more  ER 1998»
15 years 8 months ago
From Object Oriented Conceptual Modeling to Automated Programming in Java
The development of Internet commercial applications and corporate Intranets around the world, which uses Java as the de facto standard language, is a significant topic in modern S...
Oscar Pastor, Vicente Pelechano, Emilio Insfr&aacu...
MOBISYS
2009
ACM
16 years 4 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
SAC
2009
ACM
15 years 10 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
ICSEA
2006
IEEE
15 years 10 months ago
A Partition-Based Approach for XPath Testing
—The XML language is becoming the preferred means of data interchange and representation in web based applications. Usually, XML data is stored in XML repositories, which can be ...
Claudio de la Riva, José García-Fanj...
EDBTW
2006
Springer
15 years 7 months ago
Conflict Resolution in Updates Through XML Views
Abstract. In this paper, we focus on B2B scenarios where XML views are extracted from relational databases and sent over the Web to another application that edits them and sends th...
André Prisco Vargas, Vanessa P. Braganholo,...