• MCMAS

  • Referenced in 72 articles [sw09463]
  • variety of areas including robotics, security protocols, web-services, etc. For example, security specifications involving...
  • JBoss

  • Referenced in 49 articles [sw21835]
  • frameworks, including Spring, Spring Web Flow, Spring WS, Spring Security, Arquillian, AngularJS, jQuery, jQuery Mobile...
  • Amazon EC2

  • Referenced in 47 articles [sw29777]
  • Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity...
  • TulaFale

  • Referenced in 14 articles [sw00986]
  • security tool for web services. Web services security specifications are typically expressed as a mixture...
  • Symbolic automata

  • Referenced in 5 articles [sw13262]
  • been used in the context of web security for analysis of potentially malicious data over...
  • gmp

  • Referenced in 274 articles [sw00363]
  • cryptography applications and research, Internet security applications, algebra systems, computational algebra research ... project, please see the official GNU web site. GMP’s main target platforms are Unix...
  • TS#

  • Referenced in 3 articles [sw14208]
  • examples illustrate how web security patterns that developers currently program in JavaScript (with much difficulty...
  • SOCR

  • Referenced in 12 articles [sw16634]
  • completely platform independent, web-based, interactive, extensible and secure. Over the past 4 years...
  • JCCM

  • Referenced in 2 articles [sw02303]
  • that plays a critical role in secure web surfing and e-mail signing and encryption...
  • Jwig

  • Referenced in 1 article [sw08827]
  • Another Framework for Maintainable and Secure Web Applications. Although numerous frameworks for web application programming ... XHTML-based applications and XML-based web services. Through a number of examples, we argue ... foundation for developing more maintainable and secure web applications...
  • FlowFox

  • Referenced in 7 articles [sw37815]
  • control mechanism for web scripts based on the technique of secure multi-execution. We demonstrate ... that FlowFox is compatible with the current web, by investigating its behavior on the Alexa ... web sites, many of which make intricate use of JavaScript. The performance and memory cost ... shows that information flow enforcement based on secure multi-execution can be implemented in full...
  • Saner

  • Referenced in 9 articles [sw37817]
  • data. Unfortunately, web applications are often implemented by developers with limited security skills ... lack of input validation. That is, web applications use malicious input as part...
  • CryptDB

  • Referenced in 15 articles [sw27061]
  • reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries ... requires 11-13 unique schema annotations to secure more than 20 sensitive fields ... source code changes for three multi-user web applications...
  • Lift

  • Referenced in 1 article [sw36775]
  • Lift is the most powerful, most secure web framework available today. There are Seven Things ... distinguish Lift from other web frameworks. Lift applications are: Secure -- Lift apps are resistant...
  • DPWSim

  • Referenced in 1 article [sw28230]
  • Services (DPWS) enables the use of Web services on smart and resource-constrained devices, which ... these devices with secure Web service capabilities and a seamless integration into existing World Wide...
  • Pixy

  • Referenced in 5 articles [sw25249]
  • vulnerabilities. The number and the importance of Web applications have increased rapidly over the last ... same time, the quantity and impact of security vulnerabilities in such applications have grown ... paper, we address the problem of vulnerable Web applications by means of static source code ... reconstructed 36 known vulnerabilities in three other Web applications. The observed false positive rate...
  • TAJ

  • Referenced in 7 articles [sw33114]
  • effective taint analysis of web applications. Taint analysis, a form of information-flow analysis, establishes ... into security-sensitive operations. Taint analysis can detect many common vulnerabilities in Web applications...
  • SCAIMO

  • Referenced in 1 article [sw02835]
  • SCAIMO --- a case for enabling security in semantic web service composition Web service ... Web service composition, previous works in that area do not address security issues, which ... called SCAIMO to achieve security conscious composition of Semantic Web services. We test our approach...
  • HMMPayl

  • Referenced in 1 article [sw17494]
  • hidden Markov models. Nowadays the security of Web applications is one of the key topics ... Computer Security. Among all the solutions that have been proposed so far, the analysis ... knowledge of the applications running on the Web server. The solutions proposed in the literature...
  • DISCOVER

  • Referenced in 8 articles [sw02247]
  • scientists’/engineers ’ desktop by providing collaborative web-based portals for monitoring, interaction and control. DISCOVER ... directly accessed at the interaction server. Security and authentication are provided using customizable access control...