56,833 Hits in 4.9 sec

Template-Based Runtime Invalidation for Database-Generated Web Contents [chapter]

Chun Yi Choi, Qiong Luo
2004 Lecture Notes in Computer Science  
In our approach, the invalidator sits between a web cache and a database server, and intercepts query statements as well as update statements transparently.  ...  We propose a template based runtime invalidation approach for maintaining cache consistency of database generated web contents.  ...  The invalidator in a database-backed web site Our key observation in this work is that both SQL queries and web pages generated from database-backed web sites have templates.  ... 
doi:10.1007/978-3-540-24655-8_82 fatcat:wsn7fwrq2ze6vmtlman47ocemi

WrapIt: Automated Integration of Web Databases with Extensional Overlaps [chapter]

Mattis Neiling, Markus Schaal, Martin Schumann
2003 Lecture Notes in Computer Science  
The world wide web does not longer consist of static web pages. Instead, more and more web pages are created dynamically from user request and database content.  ...  A new approach for online integration of web databases will be presented in this paper.  ...  Some web sites may answer a query directly with the result, others show a summary first.  ... 
doi:10.1007/3-540-36560-5_14 fatcat:ccgrsp6qvvfy3a6arhep2azt6m

Page 105 of American Society of Civil Engineers. Collected Journals Vol. 126, Issue 2 [page]

2000 American Society of Civil Engineers. Collected Journals  
The broker server is a com- ponent embedded in the Web server that communicates with the back-end database system. The index server connection communicates with the back-end full-text search engine.  ...  The third tier, the back-end database server and the full-text search en- gine, should also be set up at the agency site. The user subsystem contains two windows, as shown in Figs. 3 and 4.  ... 

The architecture of a one-stop web-window shop

Mona Marathe, Hemalatha Diwakar
2000 ACM SIGecom Exchanges  
A novel yet simple mediator architecture is described here for mediating e-commerce sites founded on relational databases.  ...  The same situation translated to the web, means that the shopper has to make visits to several different web-sites and evaluate articles before taking the purchase decision.  ...  It is built atop the integrated database and hosted at the same web site.  ... 
doi:10.1145/844309.844312 fatcat:cygsennyznfjpd6cg6mdkbai4a

Accessing the deep web

Bin He, Mitesh Patel, Zhen Zhang, Kevin Chen-Chuan Chang
2007 Communications of the ACM  
First, as our survey specifically focuses on online databases, we differentiate and exclude non-query HTML forms (which do not access back-end databases) from query interfaces.  ...  Second, we survey Web databases and deep Web sites based on the discovered query interfaces.  ... 
doi:10.1145/1230819.1241670 fatcat:dguqjfdlx5cdfpuoanoafmkefu

Escrow: A Large-Scale Web Vulnerability Assessment Tool

Baden Delamore, Ryan K.L. Ko
2014 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications  
We observed that for each query sent, we can scan and detect dozens of vulnerable web applications in a short space of time, while providing a means for exploitation.  ...  Additionally, it provides a simple to use graphical user interface (GUI) to navigate through a vulnerable remote database.  ...  Cross Site Scripting, at the time of writing this paper, is currently the most reported vulnerability according the MITRE CWE. VII.  ... 
doi:10.1109/trustcom.2014.130 dblp:conf/trustcom/DelamoreK14 fatcat:tdnypxjm25hjvasaswkuu2ihoi

Performance Issues of a Web Database [chapter]

Yi Li, Kevin Lü
2000 Lecture Notes in Computer Science  
Web databases are becoming an efficient tool used to manage the web sites.  ...  We explored the different ways of sending query result files. An analysis of the initial test results and suggestions on improving the Web database system performance are presented.  ...  A query result made by the database server is given back to the Web server through the same interface. Step 4.  ... 
doi:10.1007/3-540-44469-6_77 fatcat:hq4ptjbrfvbebertovbfivudoe

Multi-Tier Web Security on Web Applications from Sql Attacks

S. Suganya, D Rajthilak, G Gomathi
2014 IOSR Journal of Computer Engineering  
These attacks have recently become more diverse, as attention has shifted from attacking the front end to exploiting vulnerabilities of the web applications in order to corrupt the back-end database system  ...  Our approach can create normality models of isolated user sessions that include both the web front-end and back-end network transactions.  ...  It is more effective in securing data from back end never the less worrying about the front end security and coding.  ... 
doi:10.9790/0661-16270104 fatcat:b24vzka4l5drzpvdxfway54wvi

SQLi and XSS Attack Introduction and Prevention Technique

Harshad Gaikwad, Bhavesh B., Priyanka Chatte
2017 International Journal of Computer Applications  
Typically the web user/client supplies information, such as a username and password and web server receive user request and interact with the back-end database and returned relevant data to the Front-end  ...  The back-end database often contains confidential and sensitive information such Password, credit card number, financial data, medical data, email details.  ...  original queries and create some parameterized query in database.  ... 
doi:10.5120/ijca2017913798 fatcat:oryy52zbxjfdbhxu7rtshp5wna

WebWise: Guide to The Sanger Center's Web Site

Kim D. Pruitt
1998 Genome Research  
pages do not include links back out to other pages on this site.  ...  Specific Databases Query link.  ...  Those who are interested in performing searches or database downloads on a routine basis must navigate through the web site or bookmark the relevant page(s).  ... 
doi:10.1101/gr.8.1.4 pmid:9445482 fatcat:kgmpcvpqynd3xdzvbhbuku5mdu

A Survey on SQL Injection Attack Countermeasures Techniques

2015 International Journal of Science and Research (IJSR)  
All the web applications maintain information at the backend database from which results are retrieved.  ...  The demands for web services and mobile web application are also increased. The probability of a system being attacked is also increased.  ...  Piggy-Backed Queries: As in SQL many queries can be processed if the operator ";" is added after end of each query.  ... 
doi:10.21275/v4i11.nov151502 fatcat:p3dtky36ujh3fhnb5rkdekpxkq

Case Study Of Sql Injection Attacks

Sonakshi*, Rakesh Kumar
2016 Zenodo  
Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it.  ...  Finally, a complete set of guidelines is provided to help understand the causes of various SQLIAs and how to detect them prior and their preventive measures for the developers of database-driven web applications  ...  So, piggy-backed query attack is not possible in case of MySQL database using PHP.  ... 
doi:10.5281/zenodo.56935 fatcat:uhrm4qvzznapjiidhgpzcs5od4

Query portals

Sanjay Agrawal, Kaushik Chakrabarti, Surajit Chaudhuri, Venkatesh Ganti, Arnd Christian König, Dong Xin
2010 Proceedings of the 2010 international conference on Management of data - SIGMOD '10  
Web search engines federate such entity-oriented queries to relevant structured databases; the results of those searches are then returned to the user along with web search results.  ...  Many web queries seek information about named entities (such as products or people).  ...  We refer to the union of authoritative web sites and focused web search queries for a specific entity as entity information links.  ... 
doi:10.1145/1807167.1807310 dblp:conf/sigmod/AgrawalCCGKX10 fatcat:hk6im47eifc2recubmcfkaayna

An Architecture for Secure Web Resource with Outsourced Database

Kirill Shatilov, Sergey Krendelev, Diana Anisutina, Artem Sumaneev, Evgeny Ogurtsov
2015 Position Papers of the 2015 Federated Conference on Computer Science and Information Systems  
Secondly, proposed solution implies presence of trusted intermediate component, responsible for SQL query precessing and site hosting tasks.  ...  Our approach has been validated through the implementation of complete web resource infrastructure with encrypted database.  ...  Let us consider a web resource that is backed up by the database.  ... 
doi:10.15439/2015f59 dblp:conf/fedcsis/ShatilovKASO15 fatcat:o7r4cpz4o5ayjjgk5fcpeigynu

A Research Collaboratory for Open Source Software Research

Yongqin Gao, Matthew Van Antwerp, Scott Christley, Greg Madey
2007 First International Workshop on Emerging Trends in FLOSS Research and Development (FLOSS'07: ICSE Workshops 2007)  
It is not only a repository including over two years of monthly database dumps from, but also an online community supporting OSS related research.  ...  Web access is the simple method to access the back-end repository and it is used to implement the database query interface discussed before.  ...  Authorized users can submit queries directly to the backed repository through the database query interface.  ... 
doi:10.1109/floss.2007.1 fatcat:zrywdjesjvfblpqq5bklms25ea
« Previous Showing results 1 — 15 out of 56,833 results