A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
DEMO: Secure and customizable web development in the safe activation framework
2013
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
With the emerging complexity in (extensible) data-driven Web application development, in particular in terms of consistent data management with multiple clients (many Facebook users), ownership preservation ...
SAFE is a framework for modern Web application development with automated state consistency, enforced security at various levels, and design for Web personalization and extensibility. ...
SAFE This section recaps the main features of the SAFE framework [1, 2] for the development of secure Web applications with automatic state consistency and safe extensibility. ...
doi:10.1145/2508859.2512495
dblp:conf/ccs/ReischukSG13
fatcat:wmsl7vvbfvch7gbgkdocbzz5si
Balancing Isolation and Sharing of Data for Third-Party Extensible App Ecosystems
[article]
2015
arXiv
pre-print
needs of extensibility in application ecosystems. ...
We then instantiate our model in the SAFE web application framework (WWW 2012), resulting in a novel methodology that is inspired by traditional access control and specifically designed for the newly emerging ...
SAFE is designed for a modularized structuring of web applications into features, facilitating extensibility by third-party customizations. ...
arXiv:1412.7641v2
fatcat:bzd2di7ncbcffj7ogzkfy5hpfe
Visualizing data on the web
2013
Proceedings of the 2013 workshop on Data driven functional programming - DDFP '13
We present a language-integrated technique that can be applied to enlist web-based data visualization libraries in the type-safe discipline of F#, and to use them with various data access mechanisms to ...
visualization applications. ...
We believe that the combination of rich web and data-oriented programming has a real possibility to demonstrate that the strengths of applied functional programming are immense in these domains, and bring ...
doi:10.1145/2429376.2429383
dblp:conf/popl/DenuziereGT12
fatcat:hycqzz4nmvh7hgianlpks6y4rm
Combining events and threads for scalable network services implementation and evaluation of monadic, application-level concurrency primitives
2007
SIGPLAN notices
This paper shows how the hybrid model can be implemented entirely at the application level using concurrency monads in Haskell, which provides type-safe abstractions for both events and threads. ...
This paper shows how the hybrid model can be implemented entirely at the application level using concurrency monads in Haskell, which provides type-safe abstractions for both events and threads. ...
In addition, we would like to thank the PLDI reviewers for their valuable comments and extensive proofreading of the original draft. This work is supported by NSF grant CCF-0541040. ...
doi:10.1145/1273442.1250756
fatcat:rznvhyqnf5blzki42yggppjqru
Combining events and threads for scalable network services implementation and evaluation of monadic, application-level concurrency primitives
2007
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation - PLDI '07
This paper shows how the hybrid model can be implemented entirely at the application level using concurrency monads in Haskell, which provides type-safe abstractions for both events and threads. ...
This paper shows how the hybrid model can be implemented entirely at the application level using concurrency monads in Haskell, which provides type-safe abstractions for both events and threads. ...
In addition, we would like to thank the PLDI reviewers for their valuable comments and extensive proofreading of the original draft. This work is supported by NSF grant CCF-0541040. ...
doi:10.1145/1250734.1250756
dblp:conf/pldi/LiZ07
fatcat:i4llijobbfdyhafhodhiiznfma
From templates to schemas
2010
Proceedings of the 10th ACM symposium on Document engineering - DocEng '10
Template-driven editing allows any web user to easily enter content while schemas make sure applications can safely process this content. ...
These tools make it possible to create content targeted for lightweight web applications. ...
TEMPLATE-DRIVEN EDITING IN THE BROWSER The next step was to make XTiger template-driven editing also usable on the widely available platform offered by web browsers. ...
doi:10.1145/1860559.1860572
dblp:conf/doceng/QuintRSV10
fatcat:tuorpip3hzbpxhakyjs4dhw2pi
The Most Dangerous Code in the Browser
2015
USENIX Workshop on Hot Topics in Operating Systems
Even worse, existing browser extension systems give users a false sense of security by considering extensions to be more trustworthy than web applications. ...
Extensions are third-party code, like web applications, but run with elevated privileges. ...
INTRODUCTION The modern web browser is one of the most popular application platforms. ...
dblp:conf/hotos/HeuleRRS15
fatcat:ji6uirzgwrds3bacnyj6zqy4ja
Survey of Technologies for Web Application Development
[article]
2008
arXiv
pre-print
We conclude that, although the infrastructure problems of the Web have largely been solved, the cacophony of technologies for Web-based applications reflects the lack of a solid model tailored for this ...
Web-based application developers face a dizzying array of platforms, languages, frameworks and technical artifacts to choose from. ...
being driven by the requirements of Web applications. ...
arXiv:0801.2618v1
fatcat:dv7xxytsfzhixmhq7alsdjbate
Studying clinician-computer interaction in Web-based systems
2000
Proceedings. AMIA Symposium
It allows extensive interaction customization, data-driven response, real-time Web-based data-analysis, and full Web-based administration. ...
In this paper we suggest an alternative approach to such data acquisition. "CareQuest" is an interactive Web-based service that can be woven into clinical applications without coding. ...
Web-based acquisition session and the safe return of the user to teaching files in less than an hour from her desk at her original work in the calling application. ...
pmid:11079989
pmcid:PMC2243806
fatcat:i7xri22tpbd6pddeknmlxpw3hu
Service Objects: Adaptable, Metadata-Based Services for Multi-Tenant On-Demand Enterprise Applications
2009
Americas Conference on Information Systems
Ideally, this layer of web services can be automatically derived from the underlying domain model. ...
An adaptive, standardized service layer is a key feature of a multi-tenant on-demand enterprise application. ...
This domain model "creates a web of interconnected objects" (Fowler and Rice, 2006 ), which we defined as Business Objects consisting of data and behavior and implemented in Ruby. ...
dblp:conf/amcis/EnderleinH0KBZP09
fatcat:h5ya6q7jnbe2jaqkkv6l6qtai4
Advanced Data Driven Visualisation for Geo-spatial Data
[chapter]
2006
Lecture Notes in Computer Science
In particular we discuss how data driven approaches are applied to the spatiotemporal management aspect of the application framework, and describe the advantages these convey. ...
By utilising the latest software engineering methods and bringing a dynamic data driven approach to geo-spatial data visualisation we will deliver an unparalleled level of customisation in near-photo realistic ...
We also introduce data-driven programming as a tool for data integration, which remains an open problem for a number of GIS applications [10] . ...
doi:10.1007/11758532_77
fatcat:gvrj3lcslnasnel3fd4ze6h4m4
A Survey on Authentication Mechanism against SQL Injection in XML
2013
International Journal of Computer Applications
SQL Injection Attacks (SQLIAs) are very serious intrusion attacks on database driven web application because such attacks can lacks the confidentiality and integrity (security) of data (information) in ...
This paper presents the different kinds of SQL Injection attacks on the web based XML data and on the various present SQLIAs prevention techniques . ...
CONCLUSION Database driven web application is threatened by SQL Injection Attacks (SQLIAs) because this type of attack can compromise confidentiality and integrity of information in databases. ...
doi:10.5120/13501-1249
fatcat:7p2aqmo5vvbyfgr4zmtoglbfqa
Towards Model-Driven Testing of a Web Application Generator
[chapter]
2005
Lecture Notes in Computer Science
correctness of Web applications produced by model-driven code generators. ...
Conceptual modelling is a promising approach for Web application development, thanks to innovative CASE tools that can transform high-level specifications into executable code. ...
With model-driven development, the activity of testing a specific Web application splits into two sub-tasks: schema validation and code generator validation. ...
doi:10.1007/11531371_13
fatcat:asgwu77i55enjc7egn7swwqcka
Building appliances out of components using Pebble
2000
Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9
We found that a typical network appliance application (e.g. a Web server) built on Pebble using components has comparable performance to a traditional monolithic kernel. ...
Such performance is often achieved with application-specific specialization of system I/O [Cao95] requiring a modification of a portion of the operating system, such as the protocol stack or the file system ...
We implemented a simple, single-threaded, event-driven Web server application using a TCP stack component specialized for HTTP traffic. ...
doi:10.1145/566752.566769
fatcat:ebfbtk4ouzhffpvraismpxlxum
Building appliances out of components using Pebble
2000
Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9
We found that a typical network appliance application (e.g. a Web server) built on Pebble using components has comparable performance to a traditional monolithic kernel. ...
Such performance is often achieved with application-specific specialization of system I/O [Cao95] requiring a modification of a portion of the operating system, such as the protocol stack or the file system ...
We implemented a simple, single-threaded, event-driven Web server application using a TCP stack component specialized for HTTP traffic. ...
doi:10.1145/566726.566769
dblp:conf/sigopsE/MagoutisBGNS00
fatcat:gl7mc6buunbrjbtpoqujrjunqe
« Previous
Showing results 1 — 15 out of 65,412 results