Incorporating security into Web Applications - An Aspect oriented approach
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 4
Abstract
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web applications currently hosted are subject to risk and addressing this issue is a primary concern for organizations. Aspect oriented method to inject security concern in to web application is proposed to address this threatening risk. This work gives an outline of this self defense mechanism that should be injected in to a web application. The top vulnerabilities found in web applications are addressed and countermeasures are designed as aspects. These aspects are then injected into the hotspots of web applications. The method used to identify the hotspots is also covered in the paper. It then covers the experimental approach for detecting the vulnerabilities and testing the correctness of the self defense approach. The experiments done with various existing applications revealed so many vulnerabilities. The experiments were also done after injecting the aspect package and found that the web applications were able to defend the vulnerabilities under consideration. The performance of the application before and after injecting the aspect is measured in order to justify the feasibility of the solution.
Authors and Affiliations
Dhanya Pramod
Analytical Study on PNG image transfer on Bluetooth piconet with respect to Nodes and Time taken
The PNG image is the another one basic image format in digital world that is a enhance version of GIF, the limitation of GIF is, it is support only 256 colors and the PNG support true color, here we are going to presen...
Construction of Mixed Sampling Plans Indexed Through Six Sigma Quality Levels with Chain Sampling Plan-(0,1) as Attribute Plan
Six Sigma is a concept, a process, a measurement, a tool, a quality philosophy, a culture and a management strategy for the improvement in the system of an organization, in order to reduce wastages and increase the pro...
Congestion Control in TCP/IP Using Fuzzy Logic
Congestion occurs in the network when arrival rate to a router is greater than its departure rate. In this paper, using fuzzy logic approach, we have proposed a modified TCP delay-based congestion avoidance mechanism w...
E-Commerce and its Business Models
In the emerging global economy, e-commerce and e-business have increasingly become a necessary component of business strategy and a strong catalyst for economic development. The integration of information and communica...
ATTITUDE OF TEACHERS TOWARDS EDUCATIONAL TECHNOLOGY
Teacher is an effective and dominating factor among the ones contributing to educational improvements. Mainly, the teacher effectiveness depends on the teachers' attitude, characteristics and the classroom phenomena su...