The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aspect Oriented Software Development (AOSD) is an emerging technology that improve existing paradigms of software development, by providing explicit mean to model crosscutting concern (aspect). However, the complexity of interactions among aspects and between aspects and base modules may reduce the value of aspect-oriented separation of cross-cutting concerns. Aspects must be identified as early possible...
This paper offers a fresh perspective on the aspect of application security, highlighting a sample attack that is not currently being protected against. Here is a case study which discussed identifying poor coding practices that render Web applications vulnerable to attacks such as remote command execution. Given the increased focus on the need for application security, it is now to be hoped that...
e-commerce can be seen from different points of view. Its fields are always facing new challenges, variable conditions, evolving requirements, and thus new improvements are constantly demanded. Therefore, the importance for a usable and secure e-commerce website structure is more than necessary nowadays. In this paper we propose a requirements taxonomy consisting of the factors of security, usability,...
The adoption of WSPL as a language for expressing Web service policies has shown its adequacy. The expressivity and simplicity of that language were the key factors behind this success. A desired feature in specifying Web services policies is the introduction of the context concept. In fact, very often Web service designers look for expressing rules that depend on the context in which a Web service...
AJAX applications provide new learning possibilities through its support to dynamic interaction, knowledge sharing, and collaboration. Developers should be weary of new insecurities introduced by these capabilities. The mobile industry in particular has not made better use of AJAX because of the complexities involved dealing with open source XMLized documents such as SVGs. Such documents are becoming...
Over the past ten years, web enabled technology has been the catalyst to enhanced Electronic Service Delivery (ESD) delivery. ESD has conveniently reduced the cost to governments and at the same time benefited Ontarians by providing convenient access to services. There remains a concern that the use of web technology increases one's risk to breach of privacy. A privacy breach, where information may...
Availability and reliability from information systems have been threatened by intrusions and Unwanted Internet Traffic (UIT). To protect systems from UIT, it is desirable developing techniques that detect and forecast UIT. Intending to improve intrusion detection, in our earlier work we proposed an approach to cope with UIT in a proactive manner, using forecasting techniques combined with Return on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.