Results 301 to 310 of about 1,062,697 (366)
Some of the next articles are maybe not open access.

Web Application Security

International Journal of Applied Research on Information Technology and Computing, 2014
In today's world, web applications are used for sharing information and servicing delivery over the Internet. As their use is increasing day by day for critical services, web applications become a popular and valuable target for security attacks. Although a large number of techniques have been developed to fortify web applications and mitigate the ...
Kavita Yadav   +2 more
openaire   +2 more sources

Securing Web Applications [PDF]

open access: possible, 2003
For many Web sites security is a primary concern. This is certainly no less true for a Java J2EE Web application (and is probably even more true!). Traditionally, security for such Web sites has been controlled either programmatically by the developer or by the Web server.
John Hunt, Chris Loftus
openaire   +1 more source

Enhancing the security of Web applications [PDF]

open access: possibleIEEE Transactions on Image Processing, 2004
The main aim is to present the security elements involved in Web applications. E-commerce applications and data access applications such as a university information database may be protected using different security techniques. Considering an e-commerce application, we developed some security elements that will provide an accurate and safe data ...
Cosmin Striletchi, Mircea-Florin Vaida
openaire   +1 more source

Vulnerabilities and Security of Web Applications [PDF]

open access: possible2018 4th International Conference on Computing Communication and Automation (ICCCA), 2018
Web applications are active websites which are composition of server based programs serving user interaction and various other functionalities. Web Server security is thus an important aspect for any organisation having web server connectivity with the internet and also to ensure customers using their websites, for a secure online portal.
Upasana Sharma   +4 more
openaire   +1 more source

Analysis of Automated Web Application Security Vulnerabilities Testing

International Conference on Future Networks and Distributed Systems, 2019
In recent years, the global spread of web risks have proposed an immediate demand for security models and prevention mechanisms. This study preliminary findings analyze an extensive literature review on web application vulnerabilities security testing ...
Pariwish Touseef   +7 more
semanticscholar   +1 more source

Web Application Security: Threats, Countermeasures, and Pitfalls

Computer, 2017
Penetration testing is a crucial defense against common web application security threats such as SQL injection and cross-site scripting attacks. A proposed web vulnerability scanner automatically generates test data with combinative evasion techniques ...
Hsiu-Chuan Huang   +3 more
semanticscholar   +1 more source

Securing Web applications

Information Security Technical Report, 2008
Web application vulnerabilities have become a major concern in software security. We will present major attack patterns, i.e. SQL injection, cross-site scripting, cross-site request forgery, JavaScript hijacking, and DNS rebinding, together with a survey and assessment of the countermeasures available to web application developers.
openaire   +2 more sources

Research on Web Application Security Vulnerability Scanning Technology

IEEE Advanced Information Technology, Electronic and Automation Control Conference, 2019
With the rapid development of the Internet, web applications are becoming more and more popular. The client applications has gradually replaced by web applications in the power industry, but its security level is still relatively low, so web applications
Bin Wang   +5 more
semanticscholar   +1 more source

Web Application Firewall: Network Security Models and Configuration

Annual International Computer Software and Applications Conference, 2018
Web Application Firewalls (WAFs) are deployed to protect web applications and they offer in depth security as long as they are configured correctly. A problem arises when there is over-reliance on these tools.
Victor A. Clincy, Hossain Shahriar
semanticscholar   +1 more source

Securing collaborative Web applications

International Conference on Education and e-Learning Innovations, 2012
With the expansion of Web servers and cloud infrastructures, collaborative Web applications are increasingly used. For instance, the e-learning is a field where students, tutors and professors share remote electronic resources and processing. Nevertheless, interference between information may occur that is data can illicitly flow to not authorized ...
Manel Ameur, Takoua Abdellatif
openaire   +2 more sources

Home - About - Disclaimer - Privacy