slugIncorporating security into Web Applications - An Aspect oriented approach
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 4
Abstract
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web applications currently hosted are subject to risk and addressing this issue is a primary concern for organizations. Aspect oriented method to inject security concern in to web application is proposed to address this threatening risk. This work gives an outline of this self defense mechanism that should be injected in to a web application. The top vulnerabilities found in web applications are addressed and countermeasures are designed as aspects. These aspects are then injected into the hotspots of web applications. The method used to identify the hotspots is also covered in the paper. It then covers the experimental approach for detecting the vulnerabilities and testing the correctness of the self defense approach. The experiments done with various existing applications revealed so many vulnerabilities. The experiments were also done after injecting the aspect package and found that the web applications were able to defend the vulnerabilities under consideration. The performance of the application before and after injecting the aspect is measured in order to justify the feasibility of the solution.
Authors and Affiliations
Dhanya Pramod
FAILURE ANALYSIS OF ROLLERS OF BLOOM WITHDRAWAL STAND IN CONTINUOUS CASTING MACHINES AT VISAKHAPATNAM STEEL PLANT
In Visakhapatnam Steel Plant, 6 Nos. continuous casting machines (CCM) are installed in Continuous Casting Complex. Each CCM is 12m radius and mould size is 320mmx250mm cross-section. Bloom withdrawal stands are used i...
Generation of Intelligent Assessment Sheet with Compound Criteria in Adaptive Learning System
The computer assisted testing has proven to be an efficient and effective way to evaluate students‟ learning status such that proper tutoring strategies can be adopted to improve their learning performance. In a testin...
slugA Comparative Study Of Public (Sbi & Uti) &Private (Hdfc & Icici) Asset Management Companies Funds (Balanced, Gilt (Long Term &Short Term) On The Basis Of Nav, Fund Average Return, Risk.
Indian Mutual fund industry has witnessed a structural transformation during the past many years. Balanced Funds and the GILT-Short term and Long term funds areamong the most successful instruments grown at a fairly ra...
slugDevelopment of Virtual Experiment on Flip Flops Using virtual intelligent S oft L ab
The scope of this paper includes study and implementation of Fl ip - flops . In this research paper we have formulated how experiments on flips flops are performed using the concept of virtual...
Hostile Takeovers and Defensive Tactics: A Case study of Arcelor Mittal
Hostile Take-overs become the site of battlefields as it is witnessed in Arcelor Mittal takeover case. Five month long fierce takeover battle occurred between Arcelor and Mittal Steel which brought a lot of excitement...