Results 61 to 70 of about 784,907 (192)
Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook Internet services.
Denis Nikolaevich Kolegov +2 more
doaj
EmintWeb: Creation of embedded web applications in C++ for specific systems
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and ...
Juan Domingo +2 more
doaj +1 more source
Techniques for Attacking Web Application Security
The web is absolutely necessary part of our lives. It is wide platform which is used for information sharing and service over internet. They are used for the financial, government, healthcare, education and many critical services. Everyday billions of user purchase items, transfer money, retrieve information and communicate over web with each other ...
openaire +1 more source
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web [PDF]
BrowserID is a complex, real-world Single Sign-On (SSO) System for web applications recently developed by Mozilla. It employs new HTML5 features (such as web messaging and web storage) and cryptographic assertions to provide decentralized login, with the
Fett, Daniel +2 more
core
Secure Development - Web Application Security.
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to ...
openaire +1 more source
Building Secure Web Applications [PDF]
In these days of phishing and near-daily announcements of identity theft via large-scale data losses, it seems almost ridiculous to talk about securing the Web. At this point most people seem ready to throw up their hands at the idea or to lock down one small component that they can control in order to keep the perceived chaos at bay.
openaire +1 more source
Implementing security framework of electronic business application [PDF]
Security is an essential issue in e-commerce. Lack of security knowledge exposed e commerc e customer to threat. Security threat such as viruses, Trojan and malicious software could put customer to danger.
Aman, Hannani
core
Website Security Analysis Using Vulnerability Assessment Method
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin +4 more
doaj +1 more source
Machine learning models in web applications: A comprehensive review
The rapid growth of web applications has increased the need for advanced features and strong security. Artificial intelligence (AI) and machine learning (ML) models play a crucial role in meeting these needs by improving efficiency and enhancing security.
Kshiteesh Mani, Ajitha K.B. Shenoy
doaj +1 more source
The purpose of this paper is to present the application named SIE-Security providing web programmers with a tool that searches vulnerable links within their web site (i.e.
Iulian ALEXE, Mircea Iosif NEAMÞU
core

