-
1
-
-
71049164620
-
-
The Top Ten Most Critical Web Application Security Vulnerabilities, http://www.owasp.org/documentation/topten, last access June 27, 2007.
-
The Top Ten Most Critical Web Application Security Vulnerabilities, http://www.owasp.org/documentation/topten, last access June 27, 2007.
-
-
-
-
2
-
-
71049133047
-
-
MySQL AB, MySQL Market Share http://www.mysql.com/why-mysql/marketshare/, last access Nov 26, 2008.
-
MySQL AB, MySQL Market Share http://www.mysql.com/why-mysql/marketshare/, last access Nov 26, 2008.
-
-
-
-
3
-
-
34548089388
-
Towards realizing a formal RBAC model in real systems
-
Sophia Antipolis, France, June 20-22
-
Gail-Joon Ahn and Hongxin Hu. Towards realizing a formal RBAC model in real systems. In SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, pages 215-224.
-
(2007)
SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies
, pp. 215-224
-
-
Ahn, G.-J.1
Hu, H.2
-
4
-
-
84956993736
-
Role-based authorization constraints specification
-
Gail-Joon Ahn and Ravi S. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3(4):207-226, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.S.2
-
5
-
-
69949101497
-
Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications
-
Denver, Colorado, USA April 4, in press
-
Manar H. Alalfi, James R. Cordy, and Thomas R. Dean. "Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications". In WebTest 2009, 1st International Workshop on Web Testing, Denver,Denver, Colorado - USA April 4, 2009(in press).
-
(2009)
WebTest 2009, 1st International Workshop on Web Testing, Denver
-
-
Alalfi, M.H.1
Cordy, J.R.2
Dean, T.R.3
-
6
-
-
57849140296
-
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas
-
Antwerp, Belgium, October 15-18
-
Manar H. Alalfi, James R. Cordy, and Thomas R. Dean. SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas. In WCRE 2008, the 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 15-18, pages 187-191.
-
WCRE 2008, the 15th Working Conference on Reverse Engineering
, pp. 187-191
-
-
Alalfi, M.H.1
Cordy, J.R.2
Dean, T.R.3
-
7
-
-
38149062919
-
A Survey of Analysis Models and Methods in Website Verification and Testing
-
Como, Italy
-
Manar H. Alalfi, James R. Cordy, and Thomas R. Dean. A Survey of Analysis Models and Methods in Website Verification and Testing. In ICWE 2007, 7th International Conference on Web Engineering, Como, Italy, pages 306-311, 2007.
-
(2007)
ICWE 2007, 7th International Conference on Web Engineering
, pp. 306-311
-
-
Alalfi, M.H.1
Cordy, J.R.2
Dean, T.R.3
-
8
-
-
84878892421
-
Modeling methods for web application verification and testing: State of the art
-
in press
-
Manar H. Alalfi, James R. Cordy, and Thomas R. Dean. Modeling methods for web application verification and testing: State of the art. Softw. Test., Verif. Reliab., 2008 (in press).
-
(2008)
Softw. Test., Verif. Reliab
-
-
Alalfi, M.H.1
Cordy, J.R.2
Dean, T.R.3
-
9
-
-
2642582574
-
-
Khaled Alghathbar and Duminda Wijesekera. authUML: a three-phased framework to analyze access control specifications in use cases. In FMSE 2003, ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, pages 77-86.
-
Khaled Alghathbar and Duminda Wijesekera. authUML: a three-phased framework to analyze access control specifications in use cases. In FMSE 2003, ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, pages 77-86.
-
-
-
-
10
-
-
2442476477
-
WebUml: Reverse engineering of web applications
-
Nicosia, Cyprus, March 14-17
-
Carlo Bellettini, Alessandro Marchetto, and Andrea Trentini. WebUml: reverse engineering of web applications. In SAC 2004, ACM Symposium on Applied Computing, Nicosia, Cyprus, March 14-17, 2004, pages 1662-1669.
-
(2004)
SAC 2004, ACM Symposium on Applied Computing
, pp. 1662-1669
-
-
Bellettini, C.1
Marchetto, A.2
Trentini, A.3
-
11
-
-
33745594017
-
MDA and Analysis of Web Applications
-
TEAA2005, Trends in Enterprise Application Architecture, VLDB Workshop, Trondheim, Norway, of, Springer
-
Behzad Bordbar and Kyriakos Anastasakis. MDA and Analysis of Web Applications. In TEAA(2005), Trends in Enterprise Application Architecture, VLDB Workshop, Trondheim, Norway,, volume 3888 of LNCS, pages 44-55. Springer.
-
LNCS
, vol.3888
, pp. 44-55
-
-
Bordbar, B.1
Anastasakis, K.2
-
12
-
-
33646350744
-
WAVer: A Model Checking-based Tool to Verify Web Application Design
-
Daniela Castelluccia, Marina Mongiello, Michele Ruta, and Rodolfo Totaro. WAVer: A Model Checking-based Tool to Verify Web Application Design. Electr. Notes Theor. Comput. Sci., 157(1):61-76, 2006.
-
(2006)
Electr. Notes Theor. Comput. Sci
, vol.157
, Issue.1
, pp. 61-76
-
-
Castelluccia, D.1
Mongiello, M.2
Ruta, M.3
Totaro, R.4
-
13
-
-
33646831658
-
The TXL source transformation language
-
James R. Cordy. The TXL source transformation language. Sci. Comput. Program., 61(3):190-210, 2006.
-
(2006)
Sci. Comput. Program
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.R.1
-
14
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
151
-
D.Basin, J.Doser, and T. Lodderstedt. Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1):39-91, 01 2006.
-
(2006)
ACM Trans. Softw. Eng. Methodol
, vol.39-91
, pp. 01
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
15
-
-
71049140419
-
-
Canoo Engineering. Canoo WebTest, http://webtest.canoo.com.
-
Canoo Engineering. Canoo WebTest, http://webtest.canoo.com.
-
-
-
-
16
-
-
18844454053
-
A testing framework for Web application security assessment
-
485
-
Yao-Wen Huang, Chung-Hung Tsai, Tsung-Po Lin, Shih-Kun Huang, D. T. Lee, and S. Y Kuo. A testing framework for Web application security assessment. Computer Networks, 48(5):739-761, 08 2005.
-
(2005)
Computer Networks
, vol.739-761
, pp. 08
-
-
Huang, Y.-W.1
Tsai, C.-H.2
Lin, T.-P.3
Huang, S.-K.4
Lee, D.T.5
Kuo, S.Y.6
-
17
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
New York, NY, USA, May 17-20
-
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, and Sy-Yen Kuo. Securing web application code by static analysis and runtime protection. In the 13th international conference on World Wide Web, WWW 2004, New York, NY, USA, May 17-20, pages 40-52, 2004.
-
(2004)
the 13th international conference on World Wide Web, WWW 2004
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
18
-
-
71049128200
-
-
Sanctum Inc. Web Application Security Testing, AppScan 3.5., http://www.sanctuminc.com, last access September 5, 2007.
-
Sanctum Inc. Web Application Security Testing, AppScan 3.5., http://www.sanctuminc.com, last access September 5, 2007.
-
-
-
-
21
-
-
71049168328
-
-
Netcraft Ltd. November 2008 web server survey, http://news.netcraft.com/ archives/2008/11/19/november-2008-web-server-survey.html, last access Nov 26, 2008.
-
Netcraft Ltd. November 2008 web server survey, http://news.netcraft.com/ archives/2008/11/19/november-2008-web-server-survey.html, last access Nov 26, 2008.
-
-
-
-
22
-
-
71049161161
-
-
PHP Group. PHP usage Stats for April 2007, http://www.php.net/usage.php, last access June 27, 2007.
-
PHP Group. PHP usage Stats for April 2007, http://www.php.net/usage.php, last access June 27, 2007.
-
-
-
-
23
-
-
71049126934
-
-
phpBB Group. PhpBB, http://www.phpbb.com/, last access June 27, 2007.
-
phpBB Group. PhpBB, http://www.phpbb.com/, last access June 27, 2007.
-
-
-
-
24
-
-
0030086382
-
Role-based access control models
-
February
-
R. S.Sandhu, E. J.Coyne, H. L.Feinstein, and C. E.Youman. Role-based access control models. Computer, 29(2):38, February 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
25
-
-
71049176955
-
-
WatirCraft. WATIR, http://wtr.rubyforge.org.
-
WatirCraft. WATIR, http://wtr.rubyforge.org.
-
-
-
|