Toward discovering and exploiting private server-side Web API
Most of the interfaces for mobile application and server interaction use the Web API for communication,but the Web API introduced by these mobile applications may introduce new security issues.To facilitate the study of the security of Web API,a system ...
Jia CHEN, Shan-qing GUO
doaj +3 more sources
OWASP Top 10 Review of Vulnerability Studies in Web Application Security
In order to ensure information security, it is necessary to find the vulnerabilities and risks that exist in the resources that make up the information system.
Çisem Yaşar +2 more
doaj +1 more source
Analyse the risks of ad hoc programming in web development and develop a metrics of appropriate tools [PDF]
Today the World Wide Web has become one of the most powerful tools for business promotion and social networking. As the use of websites and web applications to promote the businesses has increased drastically over the past few years, the complexity of ...
Al-Sherbaz, Ali, Gubhaju, Manish
core +1 more source
Assessment of the web application security effectiveness against various methods of network attacks
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications.
Mateusz Erbel, Piotr Kopniak
doaj +1 more source
A Secure Framework for Communication and Data Processing in Web Applications
Web applications are widely used, and the applications deployed on the web do not always satisfy all the security policies. This may arise due to less secure configurations, less knowledge in security configurations, or due to insecure coding practices ...
Suprakash Sudarsanan Nair +1 more
doaj +1 more source
Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza +4 more
core
SafeWeb: A Middleware for Securing Ruby-Based Web Applications [PDF]
Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties.
A. Chaudhuri +15 more
core +7 more sources
Comparison of the effectiveness of tools for testing the security of web applications
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj +1 more source
Development of Security Identification and Monitoring System for Web Application [PDF]
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data.
Dani, Norizawati
core
Threat Modelling for Active Directory [PDF]
This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology.
Chadwick, David
core +2 more sources

