119 Hits in 4.3 sec

MobSTer: A model-based security testing framework for web applications

Michele Peroli, Federico De Meo, Luca Viganò, Davide Guardini
2018 Software testing, verification & reliability  
Penetration testing is the most common approach for testing the security of web applications, but model-based security testing has been steadily maturing into a viable alternative and/or complementary  ...  In this paper, we introduce MobSTer, a formal and flexible model-based security testing framework that contributes to filling the gap between these two security testing approaches.  ...  ACKNOWLEDGEMENTS This paper is largely based on Michele Peroli's PhD Thesis [35] and was partially supported by the EU FP7 Project no. 257876, "SPaCIoS: Secure Provision and Consumption in the Internet  ... 
doi:10.1002/stvr.1685 fatcat:6euvzblhmvffbaxgc4i5eax5qa

Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to A Security Model with Cache

Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Jason Paul Cruz, Shouei Ou, Takao Okubo
2019 IEEE Access  
As concrete applications, we describe a web security model that includes caches and show that our proposed syntax can analyze state-of-the-art attacks, such as unauthorized access to users' account pages  ...  The source code of our proposed model in Alloy is publicly available. INDEX TERMS Alloy, cache, formal methods, security model, temporal logic, web security.  ...  ACKNOWLEDGMENT The authors would like to thank for their support. They would also like to thank Ju Chien Cheng for proofreading this manuscript.  ... 
doi:10.1109/access.2019.2920675 fatcat:tmoorwl2org6dbou37g453ii3m

Autonomous Context-Based Service Optimization in Mobile Cloud Computing

Piotr Nawrocki, Bartlomiej Sniezynski
2017 Journal of Grid Computing  
The main objective of this paper is to investigate the possibilities for using a decision module on mobile devices in order to autonomously optimize the execution of services within the framework of Mobile  ...  A novel model of the decision module with learning capabilities, service-oriented architecture, and service selection optimization algorithm are proposed to solve this problem.  ...  We thank Małgorzata Płażek, Jakub Czyżewski and Daniel Olszowski for assistance with implementation and testing.  ... 
doi:10.1007/s10723-017-9406-2 fatcat:6opha3pvobc2bkiybjymgv4rse

Adaptive Service Management in Mobile Cloud Computing by Means of Supervised and Reinforcement Learning

Piotr Nawrocki, Bartlomiej Sniezynski
2017 Journal of Network and Systems Management  
The main objective of this article is to investigate the possibilities for using machine learning on mobile devices in order to manage the execution of services within the framework of Mobile Cloud Computing  ...  By employing machine learning techniques, the agent working on a mobile device gains experience in determining the optimal place for the execution of a given type of task.  ..., which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a  ... 
doi:10.1007/s10922-017-9405-4 fatcat:pw7hiyjnnrh3lmhshcsf2pl2em

Monitoring the Application [chapter]

Adam Shackelford
2015 Beginning Amazon Web Services with Node.js  
We are currently working on using our classifier to make communication decisions on when to transmit files based upon wave-parameters.  ...  During the next few months we are doing field trials that will help us test if these ideas are practically feasible in adapting communication protocols to improve communication between gliders and shore  ...  Geospatial tools The GIS branch of Django, GeoDjango, provides a geographic web-framework for building GIS web-applications.  ... 
doi:10.1007/978-1-4842-0653-9_7 fatcat:b6s3wv3jcvf6xiniouokdhwtba

Who killed the virtual case file? [case management software

H. Goldstein
2005 IEEE spectrum  
Application, and the Telephone Application-accessible via a pointand-click Web interface.  ...  Matthew Patton answered an ad on SAIC's Web site for security engineers.  ... 
doi:10.1109/mspec.2005.1502526 fatcat:nctou5ezkfgipj6pm7ciomlpvi

New Governance, Compliance, and Principles-Based Securities Regulation

Cristie L. Ford
2008 American Business Law Journal  
for mobsters and undesirables'').  ...  Principles-Based Accounting Standards: A Test of the Skinner Hypothesis (June 2004), available at  ...  The hybrid FSA model permits a more piecemeal approach to substituting a particular innovation for a specific rule. ).  ... 
doi:10.1111/j.1744-1714.2008.00050.x fatcat:7hko3xkmmbhnzdsa2avfpkaq6a

Characteristic Organized Crimes I: Conspiracy and Provision of Illicit Goods and Services [chapter]

2014 Organized Crime in Our Times  
approached by people thinking he is a mobster in real life.  ...  That approach lacks the conceptual framework required for meaningful research and investigations in the field.  ... 
doi:10.4324/9781315721460-9 fatcat:qhovxnkfprbjlpibcy5rgk632u

Sting Operations, Undercover Agents and Entrapment

Bruce L. Hay
2003 Social Science Research Network  
a framework for identifying desirable sting operations, a framework that is necessarily very general in character.  ...  The theory behind using a sting for informational purposes is that it operates as a test.  ... 
doi:10.2139/ssrn.469960 fatcat:6blc6mgvwnd7dhj36ewbaxncr4

Investigating the Impact of Crime Reporting on Crime Control in Gwagwalada Area Council Abuja North Central Nigeria

Eze Victor, Diyoke Michael Chika, Idoko Innocent
2019 Zenodo  
Interview for this study was held with 10 Police officers.  ...  A research design is applied i.e. called descriptive which was used in the study.  ...  Theoretical Framework Three classic theoretical models in studies on crime victims' reporting behavior will review for the purpose of tailoring this work.  ... 
doi:10.5281/zenodo.3374028 fatcat:xyfduklcnfbblehiqkkmr6frna

Understanding Internet Usage

Robert Larose, Dana Mastro, Matthew S. Eastin
2001 Social science computer review  
Internet addiction was interpreted as a deficient self-regulation within the social-cognitive framework.  ...  In a survey of 171 college students, the social-cognitive model explained 60% of the available variance in Internet usage using multiple regression analysis, a significant improvement over prior uses and  ...  He is a member of the National Academy of Sciences and a fellow of the American Academy of Arts and Sciences and has been a Guggenheim fellow and a fellow of the Center for Advanced Study in the Behavioral  ... 
doi:10.1177/089443930101900401 fatcat:7xggydjopjcw5ojbfhyxj4sudu

Book review

Richard C. Katz
1998 Aphasiology  
squabbles and hurt feelings," 97 based on a model by two UC Irvine mathematical psychologists, Louis Narens and R.  ...  Their framework treats legal rights as constraints, much like philosopher Robert Nozick's view that rights are side-constraints. 93 Bruce Chapman, a law professor whose research includes applications  ... 
doi:10.1080/02687039808250475 fatcat:jloxk6urujcopkpvqx3hfk2swu

Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications [article]

Mário S. Alvim
2012 arXiv   pre-print
We apply quantitative approaches to information flow in the first two cases, and we propose improvements for the usual solutions based on process equivalences for the third case.  ...  We show that, in the presence of nondeterminism, this approach may rely on the assumption that the scheduler "works for the benefit of the protocol", and this is often not a safe assumption.  ...  Other examples of interactive programs include web servers, GUI applications, and command-line programs [BPS + 09].  ... 
arXiv:1111.3013v3 fatcat:g65h6p4xsfe6xnxbhpwkksyjaq

Criminal Law in Cyberspace

Neal Kumar Katyal
2001 Social Science Research Network  
., 1997) (proposing a model for internet governance based on "decentralized, emergent law" stemming from the "voluntary acceptance of standards"); David R.  ...  Sometimes it will only pose questions, and other times it will only suggest possible frameworks for approaching problems.  ...  the last minute before she commits a crime.  ... 
doi:10.2139/ssrn.249030 fatcat:q5ieh6h7z5blvhfkuop2ytnjee

Next-Generation Sequencing — An Overview of the History, Tools, and "Omic" Applications [chapter]

Jerzy K. Kulski
2016 Next Generation Sequencing - Advances, Applications and Challenges  
"t that time, scientists could sequence only a few base pairs per year, not nearly enough to sequence an entire gene.  ...  In this chapter, the advances, applications, and challenges of NGS are reviewed starting with a history of first-generation sequencing followed by the major NGS platforms, the bioinformatics issues confronting  ...  Some web-based metabolomic resources include F"ME, "romaDeg, Metabolomexpress, and Metabo"nalyst Table .  ... 
doi:10.5772/61964 fatcat:bkim7ruukfajtk7bmvw7xs2dd4
« Previous Showing results 1 — 15 out of 119 results