Sciweavers

1943 search results - page 288 / 389
» Web application security engineering
Sort
View
ICCBR
1999
Springer
15 years 8 months ago
Case Representation, Acquisition, and Retrieval in SIROCCO
As part of our investigation of how abstract principles are operationalized to facilitate their application to specific fact situations, we have begun to develop and experiment wit...
Bruce M. McLaren, Kevin D. Ashley
TWEB
2010
164views more  TWEB 2010»
15 years 2 months ago
A distributed service-oriented architecture for business process execution
The Business Process Execution Language (BPEL) standardizes the development of composite enterprise applications that make use of software components exposed as Web services. BPEL...
Guoli Li, Vinod Muthusamy, Hans-Arno Jacobsen
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 9 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
CCS
2007
ACM
15 years 10 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
141
Voted
SACMAT
2009
ACM
15 years 8 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...