Incorporating security into Web Applications - An Aspect oriented approach
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 4
Abstract
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web applications currently hosted are subject to risk and addressing this issue is a primary concern for organizations. Aspect oriented method to inject security concern in to web application is proposed to address this threatening risk. This work gives an outline of this self defense mechanism that should be injected in to a web application. The top vulnerabilities found in web applications are addressed and countermeasures are designed as aspects. These aspects are then injected into the hotspots of web applications. The method used to identify the hotspots is also covered in the paper. It then covers the experimental approach for detecting the vulnerabilities and testing the correctness of the self defense approach. The experiments done with various existing applications revealed so many vulnerabilities. The experiments were also done after injecting the aspect package and found that the web applications were able to defend the vulnerabilities under consideration. The performance of the application before and after injecting the aspect is measured in order to justify the feasibility of the solution.
Authors and Affiliations
Dhanya Pramod
Performance Analysis of Destination Sequenced Distance Vector (DSDV) Routing, using Random Waypoint Mobility Model in NS-3
Routing protocols are a critical aspect to performance in mobile wireless networks. The development of new protocols requires testing against well-known protocols in various simulation environments. In this paper, pres...
Factors of default in Small and Medium Enterprise: an Application of Cluster Analysis
Lending activity is an integral part of the banking business. Howsoever good a bank may be in its credit management it cannot escape the natural laws operating within the dynamics of advance and recovery. To put in mor...
HIGHER ORDER MUTATION TESTING (RESULT- EQUIVALENT MUTANTS)
Whenever we make a single change to the original program we get First Order Mutant (FOM). When we apply another single change to FOM we get Second Order Mutant (SOM).On applying another single change to SOM we get Thir...
IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT INSERTION TECHNIQUE
Transferring information on internet or on any public network is very common now-a-days. However I is not a secure mean of transformation for transmitting any important information. Anyone can hack, peek or copy the in...
Use of Language Games in Competitive Activity: A Content Analysis of Two Nonalcoholic Beverage Brands
In 1984, Roger Enrico published, ―The Other Guy Blinked: How Pepsi Won The Cola Wars‖ in which he participated as the CEO of Pepsico USA. In his book, Enrico presented a story of the commercial competition between Peps...