Web services: problems and future directions

H Wang, JZ Huang, Y Qu, J Xie - Journal of Web Semantics, 2004 - Elsevier
Recently, Web services have generated great interests in both vendors and researchers.
Web services, based on existing Internet protocols and open standards, can provide a …

Securing web application code by static analysis and runtime protection

YW Huang, F Yu, C Hang, CH Tsai, DT Lee… - Proceedings of the 13th …, 2004 - dl.acm.org
Security remains a major roadblock to universal acceptance of the Web for many kinds of
transactions, especially since the recent sharp increase in remotely exploitable …

Using correntropy as a cost function in linear adaptive filters

A Singh, JC Principe - 2009 International Joint Conference on …, 2009 - ieeexplore.ieee.org
Correntropy has been recently defined as a localised similarity measure between two
random variables, exploiting higher order moments of the data. This paper presents the use …

Systematic review of web application security development model

B Musa Shuaibu, N Md Norwawi, MH Selamat… - Artificial Intelligence …, 2015 - Springer
In recent years, web security has been viewed in the context of securing the web application
layer from attacks by unauthorized users. The vulnerabilities existing in the web application …

Schrödinger's security: opening the box on app developers' security rationale

D Van Der Linden, P Anthonysamy… - Proceedings of the …, 2020 - dl.acm.org
Research has established the wide variety of security failures in mobile apps, their
consequences, and how app developers introduce or exacerbate them. What is not well …

A testing framework for web application security assessment

YW Huang, CH Tsai, TP Lin, SK Huang, DT Lee… - Computer Networks, 2005 - Elsevier
The rapid development phases and extremely short turnaround time of Web applications
make it difficult to eliminate their vulnerabilities. Here we study how software testing …

Identifying cross site scripting vulnerabilities in web applications

GA Di Lucca, AR Fasolino, M Mastoianni… - … Workshop on Web …, 2004 - ieeexplore.ieee.org
Cross site scripting (XSS) is a vulnerability of a Web application that is essentially caused by
the failure of the application to check up on user input before returning it to the client's Web …

Location privacy in ubiquitous computing

AR Beresford - 2005 - cl.cam.ac.uk
The field of ubiquitous computing envisages an era when the average consumer owns
hundreds or thousands of mobile and embedded computing devices. These devices will …

Communication across domains

S Isaacs, G Moore, D Thorpe… - US Patent 8,185,737, 2012 - Google Patents
2003/0002526 A1 1/2003 Dias et al. 2005/0256924 A1 11/2005 Chory et al. 2003/0014659
A1 1/2003 Zhu 2005/0259655 A1 11/2005 Cuervo et al. 2003/0023445 A1 1/2003 Trifon …

Web engineering: Introduction and perspectives

S Murugesan, A Ginige - Web engineering: principles and techniques, 2005 - igi-global.com
Web-based systems and applications now deliver a complex array of functionality to a large
number of diverse groups of users. As our dependence and reliance on the Web has …