Please use this identifier to cite or link to this item:
http://repository.kln.ac.lk/handle/123456789/18987
Title: | Web application securing methods |
Authors: | Wickramasinghe, B.K.T.P. Wedasinghe., N. |
Keywords: | Cross-site scripting SQL injection Web application |
Issue Date: | 2018 |
Publisher: | International Research Conference on Smart Computing and Systems Engineering - SCSE 2018 |
Citation: | Wickramasinghe,B.K.T.P. and Wedasinghe.N. (2018). Web application securing methods. International Research Conference on Smart Computing and Systems Engineering - SCSE 2018, Department of Industrial Management, Faculty of Science, University of Kelaniya, Sri Lanka. p.98. |
Abstract: | Web applications are one of the most prevalent platforms for information and services delivery over Internet today. As they are increasingly used for critical services, web applications become a popular and valuable target for security attacks. Although a large body of techniques have been developed to fortify web applications and mitigate the attacks toward web applications, there is little effort devoted to drawing connections among these techniques and building a big picture of web application security research. The main objective of this paper is to point out the possible vulnerabilities in a content serving web application and propose suitable security techniques to protect the site from the attack and provide significant help to the developer of a web application. This research paper organizes the existing research works on securing web applications into three categories based on their design philosophy: security by construction, security by verification and security by protection. Finally, this research paper summarizes the lessons learnt and discuss future research opportunities in this area. |
URI: | http://repository.kln.ac.lk/handle/123456789/18987 |
Appears in Collections: | Smart Computing and Systems Engineering - 2018 (SCSE 2018) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SCSE Proceedings - (98).pdf | 522.27 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.