DSpace@nitr >
National Institue of Technology- Rourkela >
Conference Papers >

Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/1394

Full metadata record

DC FieldValueLanguage
contributor.authorDalai, A K-
contributor.authorJena, S K-
date.accessioned2011-02-25T09:31:51Z-
date.available2011-02-25T09:31:51Z-
date.issued2011-02-
identifier.citationInternational Conference on Communication, Computing and Security, 2011 (ICCCS'11), P 565-568en
identifier.isbn978-1-4503-0464-1/11/02-
identifier.urihttp://hdl.handle.net/2080/1394-
descriptionCopyright belongs to Proceedings Publisher- ACMen
description.abstractThe application of security in web application is of profound importance due to the extended use of web for business. Most of the attacks, are either because the developers are not considering security as a concern or due to the security flaws in designing and developing the applications. The enforcement of security in the software development life cycle of the application may reduce the high cost and efforts associated with implementing security at a later stage. For this purpose, various attempts has been made to define some security patterns keeping the attacks in mind. The developers now can use these patterns but sometimes it is difficult to choose a pattern from the large list, which may or may not suit the context. This paper is based on analyzing the existing security patterns. Here web application vulnerabilities has been classified and pairing is done between each vulnerability and a suitable pattern.en
format.extent1736247 bytes-
format.mimetypeapplication/pdf-
language.isoen-
publisherACMen
subjectWeb Application Security Risksen
subjectDesign Patternsen
subjectSecurity Patternsen
titleEvaluation of Web Application Security Risks and Secure Design Patternsen
typeArticleen
Appears in Collections:Conference Papers

Files in This Item:

File Description SizeFormat
p565-dalai.pdf1695KbAdobe PDFView/Open

Show simple item record

All items in DSpace are protected by copyright, with all rights reserved.

 

Powered by DSpace Feedback