-
1
-
-
70349162582
-
Securing Web Applications with Static and Dynamic Information Flow Tracking
-
January 7-8, San Francisco, California, USA
-
Monica S. Lam, Michael Martin, Benjamin Livshits, and John Whaley, "Securing Web Applications with Static and Dynamic Information Flow Tracking," PEPM'08, January 7-8, 2008, San Francisco, California, USA.
-
(2008)
PEPM'08
-
-
Lam, M.S.1
Martin, M.2
Livshits, B.3
Whaley, J.4
-
4
-
-
35348845024
-
-
Technical Report,Stanford University,September 22
-
Benjamin Livshits, Michael Martin, and Monica S. Lam, "SecuriFly: Runtime Protection and Recovery from Web Application Vulnerabilities," Technical Report,Stanford University,September 22, 2006.
-
(2006)
SecuriFly: Runtime Protection and Recovery from Web Application Vulnerabilities
-
-
Livshits, B.1
Martin, M.2
Lam, M.S.3
-
7
-
-
18844367044
-
Web Application Security Assessment
-
SPI Dynamics
-
SPI Dynamics. "Web Application Security Assessment." SPI Dynamics Whitepaper, 2003.
-
(2003)
SPI Dynamics Whitepaper
-
-
-
8
-
-
70349113631
-
-
OWASP."WebScarabProject." http://www.owasp.org/webscarab.
-
WebScarabProject
-
-
-
9
-
-
19944365247
-
Securing Web application code by static analysis and runtime protection
-
Y.W. Huang, S.K. Huang, T.P. Lin, C.H. Tsai, "Securing Web application code by static analysis and runtime protection," in: Proceedings of the 13th International World Wide Web Conference, New York, May 17-22, 2004.
-
Proceedings of the 13th International World Wide Web Conference, New York, May 17-22, 2004
-
-
Huang, Y.W.1
Huang, S.K.2
Lin, T.P.3
Tsai, C.H.4
-
10
-
-
4544358830
-
Verifying Web applications using bounded model checking
-
Y.W. Huang, F. Yu, C. Hang, C.H. Tsai, D.T. Lee, S.Y. Kuo, "Verifying Web applications using bounded model checking,", Proceedings of the 2004 International Conference Dependable Systems and Networks (DSN2004), Florence, Italy, June 28-July 1, 2004.
-
Proceedings of the 2004 International Conference Dependable Systems and Networks (DSN2004), Florence, Italy, June 28-July 1, 2004
-
-
Huang, Y.W.1
Yu, F.2
Hang, C.3
Tsai, C.H.4
Lee, D.T.5
Kuo, S.Y.6
-
13
-
-
38049080988
-
-
March
-
Sanctum Inc. AppShield. white paper. March 2003. http://www.sanctuminc. com/.
-
(2003)
AppShield. White Paper
-
-
-
14
-
-
77953069969
-
Abstracting Application-Level Web Security
-
Scott, D., Sharp, R. "Abstracting Application-Level Web Security." In: The 11th International Conference on the World Wide Web (Honolulu, Hawaii, May 2002), 396-407.
-
The 11th International Conference on the World Wide Web (Honolulu, Hawaii, May 2002)
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
17
-
-
18844454053
-
A Testing Framework for Web Application Security Assessment
-
Jun. Elsevier. 2th
-
Deng-Jyi Chen, Chung-Chien Hwang, Shih-Kun Huang, and David TK Chen "A Testing Framework for Web Application Security Assessment," Journal of Computer Networks, 48(5):739-761, Jun. 2005, Elsevier. 2th, 2007.
-
(2005)
Journal of Computer Networks
, vol.48
, Issue.5
, pp. 739-761
-
-
Chen, D.-J.1
Hwang, C.-C.2
Huang, S.-K.3
Chen, D.T.K.4
-
18
-
-
83455223163
-
-
Reliable Software Group Department of Computer Science University of California, Santa Barbara
-
William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer: "Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks," Reliable Software Group Department of Computer Science University of California, Santa Barbara.2006.
-
(2006)
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
-
-
Robertson, W.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
21
-
-
0242456149
-
Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
-
V. Raskin, C.F. Hempelmann, K.E. Triezenberg, Nirenburg, "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool," Proceedings of the 2001 Workshop on New Security Paradigms (NSPW-2001), pp. 53-59, 2001.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms (NSPW-2001)
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg4
-
22
-
-
0242371001
-
Security for DAML Web Services: Annotation and Matchmaking
-
The Semantic Web (ISWC 2003), Springer
-
G. Denker, L. Kagal, T. Finin, M. Paolucci, K. Sycara, "Security for DAML Web Services: Annotation and Matchmaking," The Semantic Web (ISWC 2003), LNCS 2870, Springer, pp. 335-350,2003.
-
(2003)
LNCS
, vol.2870
, pp. 335-350
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
Paolucci, M.4
Sycara, K.5
-
23
-
-
70349155990
-
-
Available at
-
DAML+OIL. Available at: http://www.daml.org/2000/12/daml+oil.dam.
-
-
-
-
24
-
-
17444432965
-
Hierarchel Kohonenen Net for Anomaly Detection in Network Security
-
S.T. Sarasamma, Q.A. Zhu, and J. Huff, "Hierarchel Kohonenen Net for Anomaly Detection in Network Security", IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics, 35(2) ,2005,pp.302-312.
-
(2005)
IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
|