• gmp

  • Referenced in 275 articles [sw00363]
  • cryptography applications and research, Internet security applications, algebra systems, computational algebra research ... project, please see the official GNU web site. GMP’s main target platforms are Unix...
  • Saner

  • Referenced in 9 articles [sw37817]
  • data. Unfortunately, web applications are often implemented by developers with limited security skills ... lack of input validation. That is, web applications use malicious input as part...
  • Amazon EC2

  • Referenced in 47 articles [sw29777]
  • provides secure, resizable compute capacity in the cloud. It is designed to make web-scale ... easier for developers. Amazon EC2’s simple web service interface allows you to obtain ... developers the tools to build failure resilient applications and isolate them from common failure scenarios...
  • CryptDB

  • Referenced in 15 articles [sw27061]
  • throughput by 14.5% for phpBB, a web forum application, and by 26% for queries from ... requires 11-13 unique schema annotations to secure more than 20 sensitive fields ... code changes for three multi-user web applications...
  • Jwig

  • Referenced in 1 article [sw08827]
  • Another Framework for Maintainable and Secure Web Applications. Although numerous frameworks for web application programming ... integration of XHTML-based applications and XML-based web services. Through a number of examples ... foundation for developing more maintainable and secure web applications...
  • TAJ

  • Referenced in 7 articles [sw33114]
  • effective taint analysis of web applications. Taint analysis, a form of information-flow analysis, establishes ... into security-sensitive operations. Taint analysis can detect many common vulnerabilities in Web applications...
  • Pixy

  • Referenced in 5 articles [sw25249]
  • number and the importance of Web applications have increased rapidly over the last years ... quantity and impact of security vulnerabilities in such applications have grown as well. Since manual ... paper, we address the problem of vulnerable Web applications by means of static source code ... known vulnerabilities in three other Web applications. The observed false positive rate is at around...
  • JBoss

  • Referenced in 49 articles [sw21835]
  • JBoss® Enterprise Application Platform 7 provides an innovative modular, cloud-ready architecture, powerful management ... distributed caching, messaging, transactions, and a full web services stack. It offers full support ... web-based frameworks, including Spring, Spring Web Flow, Spring WS, Spring Security, Arquillian, AngularJS, jQuery...
  • HMMPayl

  • Referenced in 1 article [sw17494]
  • hidden Markov models. Nowadays the security of Web applications is one of the key topics ... Computer Security. Among all the solutions that have been proposed so far, the analysis ... detailed knowledge of the applications running on the Web server. The solutions proposed...
  • TS#

  • Referenced in 3 articles [sw14208]
  • runtime, and sample applications for TS#. Our examples illustrate how web security patterns that developers...
  • JSLINQ

  • Referenced in 1 article [sw27567]
  • JSLINQ: Building Secure Applications across Tiers. Modern web and mobile applications are complex entities amalgamating ... ensuring security across tiers. This paper proposes a framework for end-to-end security ... core of our security enforcement in the form of a security type system ... practical for implementing high-assurance web and mobile applications...
  • SAFEWAPI

  • Referenced in 1 article [sw38000]
  • complicated for JavaScript web applications which may lead to severe security vulnerabilities. To help developers...
  • ConfiChair

  • Referenced in 7 articles [sw13266]
  • mixes in web browsers.par We focus on the particular cloud computing application of conference management ... identify the specific security and privacy risks that existing systems like EasyChair and EDAS pose...
  • Lift

  • Referenced in 1 article [sw36775]
  • distinguish Lift from other web frameworks. Lift applications are: Secure -- Lift apps are resistant...
  • Charlotte

  • Referenced in 10 articles [sw30253]
  • Charlotte: Metacomputing on the Web. Parallel computing on local area networks is generally based ... heterogeneity, security, and administrative boundaries. We present a system which enables application programmers to write ... system realizing this virtual machine on the Web. Load balancing and fault masking are transparently...
  • DISCOVER

  • Referenced in 8 articles [sw02247]
  • scientists’/engineers ’ desktop by providing collaborative web-based portals for monitoring, interaction and control. DISCOVER ... collaboratively interact with registered applications using a browser. The application control network enables sensors ... directly deployed with the computational objects. The application interaction gateway manages overall interaction. It uses ... directly accessed at the interaction server. Security and authentication are provided using customizable access control...
  • Fable

  • Referenced in 6 articles [sw23081]
  • manipulated only within the enforcement policy; application code must treat labeled values abstractly. Together, these ... level security goals. Fable is flexible enough to implement a wide variety of security policies ... security automata. We have implemented Fable as part of the Links web programming language ... experience using SELinks to build two substantial applications, a wiki and an on-line store...
  • SessionShield

  • Referenced in 2 articles [sw38008]
  • most prevalent security problem in the field of Web applications. One of the main attack...
  • LWeb

  • Referenced in 1 article [sw40689]
  • LWeb: Information Flow Security for Multi-tier Web Applications. This paper presents LWeb, a framework ... information flow policies in database-using web applications. In a nutshell, LWeb marries ... Haskell IFC enforcement library with the Yesod web programming framework. The implementation has two parts ... substantial web site hosting the Build it, Break it, Fix it security-oriented programming contest...
  • DPWSim

  • Referenced in 1 article [sw28230]
  • Services (DPWS) enables the use of Web services on smart and resource-constrained devices, which ... event-driven IoT applications on top of these devices with secure Web service capabilities ... toolkit to support the development of such applications. DPWSim allows developers to prototype, develop...