• SCAIMO

  • Referenced in 1 article [sw02835]
  • case for enabling security in semantic web service composition Web service is a novel distributed ... enabling interaction between heterogeneous applications distributed over the Web. A problem that has become ... Web service composition, previous works in that area do not address security issues, which ... called SCAIMO to achieve security conscious composition of Semantic Web services. We test our approach...
  • Merlin

  • Referenced in 5 articles [sw23076]
  • static and runtime analysis tools for finding security violations that are caused by explicit information ... information flow vulnerabilities commonly found in Web applications now outnumber vulnerabilities such as buffer overruns ... results, while using tools that check for security violations caused by explicit information flow. Beginning ... large business-critical Web applications that have been analyzed with CAT.NET, a state...
  • CoCon

  • Referenced in 1 article [sw40174]
  • information flow security verification of the functional kernel of a web application, the CoCon conference ... expressiveness have led to bounded-deducibility security, a novel security model and verification method generally...
  • F4F

  • Referenced in 3 articles [sw29449]
  • deeper, more precise analysis of framework-based applications. Our specification language has only a small ... benefits. We implemented specification generators for several web frameworks and added F4F support ... that many were exploitable or reflected bad security practice...
  • TryLinks

  • Referenced in 1 article [sw28846]
  • Edinburgh aimed at simplifying web development. Conventional multi-tier applications involve programming in several languages ... security vulnerabilities. In Links, programs combine all of the code of a web application...
  • Joe-E

  • Referenced in 1 article [sw35849]
  • application-specific reference monitors that cannot be bypassed; introduce and use domain-specific security abstractions ... secure, extensible systems. Joe-E demonstrates how it is possible to achieve the strong security ... complements object-capability analysis and permits additional security properties to be verified statically, compared with ... security properties that would be difficult or impossible to ensure otherwise, including a web application...
  • caGrid

  • Referenced in 10 articles [sw20965]
  • securely share information and analytic resources, and to spur a new generation of research applications ... release, or through the caGrid-browser web application http://cagrid-browser.nci.nih.gov...
  • JCCM

  • Referenced in 2 articles [sw02303]
  • enduser level. Many applications use PKCS #11 primitives for security reasons: a popular browser, like ... that plays a critical role in secure web surfing and e-mail signing and encryption ... built into the card. This results in applications having the card manufacturer’s semantics instead...
  • Concordia

  • Referenced in 6 articles [sw18597]
  • Internet and the World-Wide-Web has become widespread in recent years and mobile agent ... management of network-efficient mobile agent applications for accessing information anytime, anywhere ... language to ensure platform independence among agent applications. The design goals of Concordia have focused ... agent persistence, reliable agent transmission, and agent security. Concordia offers a flexible scheme for dynamic...
  • KAoS

  • Referenced in 3 articles [sw08864]
  • services framework for grid computing and semantic web services In this article we introduce KAoS ... emerging semantic application requirements for infrastructure, especially in the area of security and trust management...
  • BotGraph

  • Referenced in 4 articles [sw21754]
  • large scale spamming botnet detection. Network security applications often require analyzing huge volumes of data ... type of botnet spamming attacks targeting major Web email providers. Bot-Graph uncovers the correlations ... volume, we implement BotGraph as a distributed application on a computer cluster, and explore ... implementations are generally applicable to a wide class of security applications for analyzing large datasets...
  • Tapestry

  • Referenced in 2 articles [sw21833]
  • oriented framework for creating highly scalable web applications in Java. Tapestry pages and components ... Tapestry handles requests fast without sacrificing security or stability. Tapestry features live class reloading: change...
  • JTrack

  • Referenced in 1 article [sw39381]
  • introduce the JTrack platform as a secure, reliable and extendable open-source solution for remote ... Android-based smartphone application and a web-based project management dashboard. A wide range ... infrastructure. JTrack was developed to comply with security, privacy and the General Data Protection Regulation...
  • ISTA

  • Referenced in 1 article [sw09770]
  • html/Selenium IDE (for web applications). It also supports automated test generation for various coverage criteria ... only for function testing but also for security testing by using Petri nets as threat...
  • Fides

  • Referenced in 1 article [sw24322]
  • same goes for key software applications such as web browsers or mail clients ... combined approach of (1) a run-time security architecture that can efficiently protect fine-grained ... such protected binary modules. The offered security guarantees are significant: relying ... system-wide performance cost. For applications that make intensive use of protected modules, and hence...
  • IntraBuilder

  • Referenced in 1 article [sw21248]
  • special attention is dedicated to data security. At last a firm information system is developed ... application. Finally, the book turns to the WWW. Using the Netscape Navigator Gold, creating web...
  • PVSAE

  • Referenced in 2 articles [sw36766]
  • data in third party clouds. Many cloud applications need privacy preserving data encryption services with ... they need querying over encrypted data in Web based data hosting services. On the other ... outsourced encrypted data with two formal security properties in terms of IND-CKA security...
  • GPDK

  • Referenced in 1 article [sw33968]
  • secure gateway. The GPDK leverages off existing Globus/Grid middleware infrastructure as well as commodity Web ... portal building capabilities of the GPDK, allowing application developers to build customized portals more effectively...
  • ConScript

  • Referenced in 1 article [sw38007]
  • comes from the ability of a Web page to combine content and JavaScript code from ... ConScript, a client-side advice implementation for security, built on top of Internet Explorer ... hosting page to express fine-grained application-specific security policies that are enforced at runtime...
  • GATEKEEPER

  • Referenced in 2 articles [sw38003]
  • policies for javascript code. The advent of Web 2.0 has lead to the proliferation ... disparate, mutually untrusting parties, leading to undesirable security and reliability consequences. This paper proposes GATEKEEPER ... mostly static approach for soundly enforcing security and reliability policies for JavaScript programs. GATEKEEPER ... policies as succinct Datalog queries. The primary application of GATEKEEPER this paper explores...