Results 21 to 30 of about 787,843 (284)

Utilizing Object Capabilities to Improve Web Application Security [PDF]

open access: yesApplied Cybersecurity & Internet Governance, 2022
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform.
Michael Koppmann   +3 more
doaj   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2002
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Bailey, Chris   +3 more
core   +3 more sources

Security Scanner For Web Applications Case Study: Learning Management System

open access: yesJOIN: Jurnal Online Informatika, 2020
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities.
Rian Andrian, Ahmad Fauzi
doaj   +1 more source

Web Application Security Education Platform Based on OWASP API Security Project

open access: yesEmitter: International Journal of Engineering Technology, 2022
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple ...
Muhammad Idris   +2 more
doaj   +1 more source

Web Application Penetration Testing Using SQL Injection Attack

open access: yesJOIV: International Journal on Informatics Visualization, 2021
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda   +4 more
doaj   +1 more source

Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework

open access: yesJISA (Jurnal Informatika dan Sains), 2023
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj   +1 more source

RASP based Web security detection method

open access: yesDianxin kexue, 2020
At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web ...
Hang YU, Shuai WANG, Huamin JIN
doaj   +2 more sources

Web Application Security

open access: yes, 2005
As more and more sensitive information is entering web based applications, and thus are available through a web browser, securing these systems is of increasing importance. A software system accessible through the web is continuously exposed to threats, and is accessible to anyone who would like to attempt a break-in. These systems can not rely on only
Foss, Julie-Marie, Ingvaldsen, Nina
openaire   +3 more sources

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

SafeWeb: A Middleware for Securing Ruby-Based Web Applications [PDF]

open access: yes, 2011
Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties.
A. Chaudhuri   +15 more
core   +7 more sources

Home - About - Disclaimer - Privacy