Results 21 to 30 of about 1,062,697 (366)

Secure Input for Web Applications [PDF]

open access: yesTwenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007
The Web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the Web. Although the Web is convenient for many users because it provides any time, anywhere access to information and services, at the same time, it has also become a prime target for miscreants who ...
Martin Szydlowski   +2 more
openaire   +2 more sources

Security in migratory interactive web applications [PDF]

open access: yesProceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012
In ubiquitous environments migratory interactive applications allow users to perform their tasks continuously across various devices. Users can push and pull migratory Web applications from one device to another for various reasons. However, the flexibility of such pervasive applications raises various security issues, such as the risk of theft of ...
Ghiani G., Isoni L., Paterno' F.
openaire   +4 more sources

Application and Web Security [PDF]

open access: yes, 2014
As we have explored in earlier chapters, security applies to all the components of the systems including physical infrastructure like building, electricity, cables, and son on; hardware; network; software; tools / utilities; human beings including resources internal to the organization and contractors / suppliers who may be working from within the ...
Umesh Hodeghatta Rao, Umesha Nayak
openaire   +2 more sources

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications

open access: yesIEEE Access, 2020
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the user's ...
Rajeev Kumar   +5 more
doaj   +1 more source

Analisis Keamanan Sistem Informasi Berbasis Website Dengan Metode Open Web Application Security Project (OWASP) Versi 4: Systematic Review

open access: yes, 2020
--  OWASP (Open Web Application Security Project) version 4 issued by a non-profit organization called owasp.org which is dedicated to the security of web-based applications.
Anggi Elanda, Robby Lintang Buana
semanticscholar   +1 more source

A Survey on Web Application Penetration Testing

open access: yesElectronics, 2023
Websites are becoming increasingly effective communication tools. Nevertheless, web applications are vulnerable to attack and can give attackers access to sensitive information or unauthorized access to accounts.
Esra Altulaihan   +2 more
semanticscholar   +1 more source

SOA Web Security and Applications. [PDF]

open access: yesThe Journal of Object Technology, 2010
The conventional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key issues such as Java scripting and SQL injection. It causes tremendous business loss and customers risk due to taint distribution and illegal data manipulation.
Raymond Wu, Masayuki Hisada
openaire   +1 more source

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj   +1 more source

Techniques for Attacking Web Application Security [PDF]

open access: yesInternational Journal of Information Sciences and Techniques, 2016
The web is absolutely necessary part of our lives. It is wide platform which is used for information sharing and service over internet. They are used for the financial, government, healthcare, education and many critical services. Everyday billions of user purchase items, transfer money, retrieve information and communicate over web with each other ...
openaire   +3 more sources

RASP based Web security detection method

open access: yesDianxin kexue, 2020
At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web ...
Hang YU, Shuai WANG, Huamin JIN
doaj   +2 more sources

Home - About - Disclaimer - Privacy