咨询与建议

限定检索结果

文献类型

  • 5 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 软件工程
    • 3 篇 计算机科学与技术...
    • 1 篇 信息与通信工程

主题

  • 5 篇 database-backed ...
  • 3 篇 performance anti...
  • 2 篇 object-relationa...
  • 1 篇 access control
  • 1 篇 bug study
  • 1 篇 broken object-le...
  • 1 篇 rubymine plugin

机构

  • 3 篇 univ chicago il ...
  • 2 篇 univ washington ...
  • 1 篇 nyu ny usa
  • 1 篇 icsi berkeley ca...
  • 1 篇 cas univ chinese...
  • 1 篇 inst comp techno...
  • 1 篇 univ calif berke...

作者

  • 3 篇 yang junwen
  • 2 篇 subramaniam pran...
  • 2 篇 yan cong
  • 2 篇 lu shan
  • 2 篇 cheung alvin
  • 1 篇 li lian
  • 1 篇 zhang wen
  • 1 篇 huang yongheng
  • 1 篇 panda aurojit
  • 1 篇 meng haining
  • 1 篇 lu jie
  • 1 篇 shi chenghang
  • 1 篇 shenker scott
  • 1 篇 li haofeng

语言

  • 5 篇 英文
检索条件"主题词=database-backed applications"
5 条 记 录,以下是1-10 订阅
排序:
Detecting Broken Object-Level Authorization Vulnerabilities in database-backed applications  24
Detecting Broken Object-Level Authorization Vulnerabilities ...
收藏 引用
31st Conference on Computer and Communications Security
作者: Huang, Yongheng Shi, Chenghang Lu, Jie Li, Haofeng Meng, Haining Li, Lian CAS Univ Chinese Acad Sci Beijing Inst Comp Technol SKLP Beijing Peoples R China Inst Comp Technol SKLP CAS Beijing Peoples R China
Broken object-level authorization (BOLA) vulnerabilities are among the most critical security risks facing database-backed applications. However, there is still a significant gap in our systematic understanding of the... 详细信息
来源: 评论
PowerStation: Automatically Detecting and Fixing Inefficiencies of database-backed Web applications in IDE  2018
PowerStation: Automatically Detecting and Fixing Inefficienc...
收藏 引用
26th ACM Joint Meeting on European Software Engineering Conference (ESEC) / Symposium on the Foundations of Software Engineering (FSE)
作者: Yang, Junwen Yan, Cong Subramaniam, Pranav Lu, Shan Cheung, Alvin Univ Chicago Chicago IL 60637 USA Univ Washington Seattle WA 98195 USA
Modern web applications are built using a myriad of software components, and each of them exposes different programming models (e.g., application logic expressed in an imperative language, database queries expressed u... 详细信息
来源: 评论
How not to structure your database-backed web applications: a study of performance bugs in the wild  18
How <i>not</i> to structure your database-backed web applica...
收藏 引用
40th ACM/IEEE International Conference on Software Engineering (ICSE)
作者: Yang, Junwen Subramaniam, Pranav Lu, Shan Yan, Cong Cheung, Alvin Univ Chicago Chicago IL 60637 USA Univ Washington Seattle WA 98195 USA
Many web applications use databases for persistent data storage, and using Object Relational Mapping (ORM) frameworks is a common way to develop such database-backed web applications. Unfortunately, developing efficie... 详细信息
来源: 评论
Access Control for database applications: Beyond Policy Enforcement  23
Access Control for Database Applications: Beyond Policy Enfo...
收藏 引用
19th ACM Workshop on Hot Topics in Operating Systems (HotOS)
作者: Zhang, Wen Panda, Aurojit Shenker, Scott Univ Calif Berkeley Berkeley CA 94720 USA NYU New York NY USA ICSI Berkeley CA USA
There have been many recent advances in enforcing finegrained access control for database-backed applications. However, operators face significant challenges both before and after an enforcement mechanism has been dep... 详细信息
来源: 评论
Improving Performance and Quality of database-backed Software  2019
Improving Performance and Quality of Database-Backed Softwar...
收藏 引用
International Conference on Systems, Programming, Languages, and applications: Software for Humanity (SPLASH)
作者: Yang, Junwen Univ Chicago Chicago IL 60637 USA
Modern web applications have stringent latency requirements while processing an ever-increasing amount of user data. To address these challenges and improve programmer productivity, Object Relational Mapping (ORM) fra... 详细信息
来源: 评论