38 research outputs found

    An ontology-based broker: making problem-solving method reuse work

    Get PDF

    A schema-based peer-to-peer infrastructure for digital library networks

    Get PDF
    [no abstract

    Proceedings of the 2nd Int'l Workshop on Enterprise Modelling and Information Systems Architectures - Concepts and Applications (EMISA'07)

    Get PDF
    The 2nd International Workshop on “Enterprise Modelling and Information Systems Architectures – Concepts and Applications” (EMISA’07) addresses all aspects relevant for enterprise modelling as well as for designing enterprise architectures in general and information systems architectures in particular. It was jointly organized by the GI Special Interest Group on Modelling Business Information Systems (GI-SIG MoBIS) and the GI Special Interest Group on Design Methods for Information Systems (GI-SIG EMISA). -- These proceedings feature a selection of 15 high quality contributions from academia and practice on enterprise architecture models, business processes management, information systems engineering, and other important issues in enterprise modelling and information systems architectures

    “WARES”, a Web Analytics Recommender System

    Full text link
    Il est difficile d'imaginer des entreprises modernes sans analyse, c'est une tendance dans les entreprises modernes, mĂȘme les petites entreprises et les entrepreneurs individuels commencent Ă  utiliser des outils d'analyse d'une maniĂšre ou d'une autre pour leur entreprise. Pas Ă©tonnant qu'il existe un grand nombre d'outils diffĂ©rents pour les diffĂ©rents domaines, ils varient dans le but de simples statistiques d'amis et de visites pour votre page Facebook Ă  grands et sophistiquĂ©s dans le cas des systĂšmes conçus pour les grandes entreprises, ils pourraient ĂȘtre shareware ou payĂ©s. Parfois, vous devez passer une formation spĂ©ciale, ĂȘtre un spĂ©cialiste certifiĂ©s, ou mĂȘme avoir un diplĂŽme afin d'ĂȘtre en mesure d'utiliser l'outil d'analyse. D'autres outils offrent une interface d’utilisateur simple, avec des tableaux de bord, pour satisfaire leur comprĂ©hension d’information pour tous ceux qui les ont vus pour la premiĂšre fois. Ce travail sera consacrĂ© aux outils d'analyse Web. Quoi qu'il en soit pour tous ceux qui pensent Ă  utiliser l'analyse pour ses propres besoins se pose une question: "quel outil doit je utiliser, qui convient Ă  mes besoins, et comment payer moins et obtenir un gain maximum". Dans ce travail je vais essayer de donner une rĂ©ponse sur cette question en proposant le systĂšme de recommandation pour les outils analytiques web –WARES, qui aideront l'utilisateur avec cette tĂąche "simple". Le systĂšme WARES utilise l'approche hybride, mais surtout, utilise des techniques basĂ©es sur le contenu pour faire des suggestions. Le systĂšme utilise certains ratings initiaux faites par utilisateur, comme entrĂ©e, pour rĂ©soudre le problĂšme du “dĂ©marrage Ă  froid”, offrant la meilleure solution possible en fonction des besoins des utilisateurs. Le besoin de consultations coĂ»teuses avec des experts ou de passer beaucoup d'heures sur Internet, en essayant de trouver le bon outil. Le systĂšme lui–mĂȘme devrait effectuer une recherche en ligne en utilisant certaines donnĂ©es prĂ©alablement mises en cache dans la base de donnĂ©es hors ligne, reprĂ©sentĂ©e comme une ontologie d'outils analytiques web existants extraits lors de la recherche en ligne prĂ©cĂ©dente.It is hard to imagine modern business without analytics; it is a trend in modern business, even small companies and individual entrepreneurs start using analytics tools, in one way or another, for their business. Not surprising that there exist many different tools for different domains, they vary in purpose from simple friends and visits statistic for your Facebook page, to big and sophisticated systems designed for the big corporations, they could be free or paid. Sometimes you need to pass special training, be a certified specialist, or even have a degree to be able to use analytics tool, other tools offers simple user interface with dashboards for easy understanding and availability for everyone who saw them for the first time. Anyway, for everyone who is thinking about using analytics for his/her own needs stands a question: “what tool should I use, which one suits my needs and how to pay less and get maximum gain”. In this work, I will try to give an answer to this question by proposing a recommender tool, which will help the user with this “simple task”. This paper is devoted to the creation of WARES, as reduction from Web Analytics REcommender System. Proposed recommender system uses hybrid approach, but mostly, utilize content–based techniques for making suggestions, while using some user’s ratings as an input for “cold start” search. System produces recommendations depending on user’s needs, also allowing quick adjustments in selection without need of expensive consultations with experts or spending lots of hours for Internet search, trying to find out the right tool. The system itself should perform as an online search using some pre–cached data in offline database, represented as an ontology of existing web analytics tools, extracted during the previous online search

    Benutzerprofile fĂŒr die Anfrageverarbeitung in verteilten Digitalen Bibliotheken [online]

    Get PDF

    Code-injection Verwundbarkeiten in Web Anwendungen am Beispiel von Cross-site Scripting

    Get PDF
    The majority of all security problems in today's Web applications is caused by string-based code injection, with Cross-site Scripting (XSS)being the dominant representative of this vulnerability class. This thesis discusses XSS and suggests defense mechanisms. We do so in three stages: First, we conduct a thorough analysis of JavaScript's capabilities and explain how these capabilities are utilized in XSS attacks. We subsequently design a systematic, hierarchical classification of XSS payloads. In addition, we present a comprehensive survey of publicly documented XSS payloads which is structured according to our proposed classification scheme. Secondly, we explore defensive mechanisms which dynamically prevent the execution of some payload types without eliminating the actual vulnerability. More specifically, we discuss the design and implementation of countermeasures against the XSS payloads Session Hijacking'', Cross-site Request Forgery'', and attacks that target intranet resources. We build upon this and introduce a general methodology for developing such countermeasures: We determine a necessary set of basic capabilities an adversary needs for successfully executing an attack through an analysis of the targeted payload type. The resulting countermeasure relies on revoking one of these capabilities, which in turn renders the payload infeasible. Finally, we present two language-based approaches that prevent XSS and related vulnerabilities: We identify the implicit mixing of data and code during string-based syntax assembly as the root cause of string-based code injection attacks. Consequently, we explore data/code separation in web applications. For this purpose, we propose a novel methodology for token-level data/code partitioning of a computer language's syntactical elements. This forms the basis for our two distinct techniques: For one, we present an approach to detect data/code confusion on run-time and demonstrate how this can be used for attack prevention. Furthermore, we show how vulnerabilities can be avoided through altering the underlying programming language. We introduce a dedicated datatype for syntax assembly instead of using string datatypes themselves for this purpose. We develop a formal, type-theoretical model of the proposed datatype and proof that it provides reliable separation between data and code hence, preventing code injection vulnerabilities. We verify our approach's applicability utilizing a practical implementation for the J2EE application server.Cross-site Scripting (XSS) ist eine der hĂ€ufigsten Verwundbarkeitstypen im Bereich der Web Anwendungen. Die Dissertation behandelt das Problem XSS ganzheitlich: Basierend auf einer systematischen Erarbeitung der Ursachen und potentiellen Konsequenzen von XSS, sowie einer umfassenden Klassifikation dokumentier Angriffsarten, wird zunĂ€chst eine Methodik vorgestellt, die das Design von dynamischen Gegenmaßnahmen zur Angriffseingrenzung erlaubt. Unter Verwendung dieser Methodik wird das Design und die Evaluation von drei Gegemaßnahmen fĂŒr die Angriffsunterklassen "Session Hijacking", "Cross-site Request Forgery" und "Angriffe auf das Intranet" vorgestellt. Weiterhin, um das unterliegende Problem grundsĂ€tzlich anzugehen, wird ein Typ-basierter Ansatz zur sicheren Programmierung von Web Anwendungen beschrieben, der zuverlĂ€ssigen Schutz vor XSS LĂŒcken garantiert
    corecore