slugIncorporating security into Web Applications - An Aspect oriented approach

Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 4

Abstract

In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web applications currently hosted are subject to risk and addressing this issue is a primary concern for organizations. Aspect oriented method to inject security concern in to web application is proposed to address this threatening risk. This work gives an outline of this self defense mechanism that should be injected in to a web application. The top vulnerabilities found in web applications are addressed and countermeasures are designed as aspects. These aspects are then injected into the hotspots of web applications. The method used to identify the hotspots is also covered in the paper. It then covers the experimental approach for detecting the vulnerabilities and testing the correctness of the self defense approach. The experiments done with various existing applications revealed so many vulnerabilities. The experiments were also done after injecting the aspect package and found that the web applications were able to defend the vulnerabilities under consideration. The performance of the application before and after injecting the aspect is measured in order to justify the feasibility of the solution.

Authors and Affiliations

Dhanya Pramod

Keywords

Related Articles

LEXICOGRAPHICAL ORDE R/ SORTING USING BOOST LIBRARY IMPLEMENTATION

Background: the lexicographic or lexicographical order (also known as lexical order, dictionary order, alphabetical order or lexicographic(al) product) is a generalization of alphabetically ordered based on the alphab...

Different Types of Matrices in Intuitionistic Fuzzy Soft Set Theory and Their Application in Predicting Terrorist Attack

The purpose of this paper is to introduce different types of intuitionistic fuzzy soft matrices along with some new operations in the parlance of intuitionistic fuzzy soft set theory. Then based on some of these new ma...

slugCongestion Control in TCP/IP Using Fuzzy Logic

Congestion occurs in the network when arrival rate to a router is greater than its departure rate. In this paper, using fuzzy logic approach, we have proposed a modified TCP delay-based congestion avoidance mechanism w...

Mentoring Programs: A Case Study of an Automative Company

The Company ran a mentoring program for the HIPOs(High Performers).As a part of its international development project aimed at leadership development, digital transformation and high performance culture need was felt...

ESTABLISHMENT OF THE RELATIONSHIP BETWEEN OCCUPATIONAL/ JOB STRESS AND OCCUPATIONAL ANXIETY-A STUDY OF MARKETING MANAGERS OF SELECTED INDIAN PRIVATE BANKS AT NAGPUR

Management Facilitator Peter Drucker wrote “Marketing is the distinguishing unique function of the business.” In 1991, Marketing expert Regis Mckenna expressed a viewpoint in Harvard Business Review Article as –“Market...

Download PDF file
  • EP ID EP18231
  • DOI -
  • Views 315
  • Downloads 12

How To Cite

Dhanya Pramod (2012). slugIncorporating security into Web Applications - An Aspect oriented approach. International Journal of Management, IT and Engineering, 2(4), -. https://europub.co.uk/articles/-A-18231