Validation and Integrity Mechanism for Web Application Security
نویسندگان
چکیده
منابع مشابه
GIVS: Integrity Validation for Grid Security
In this paper we address the problem of granting the correctness of Grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence of malicious hosts by statistical sampling of computations results. Performance overheads of GIVS strategies are evaluated using statistical models and simulation.
متن کاملconstruction and validation of translation metacognitive strategy questionnaire and its application to translation quality
like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...
Web Application Security
Web application security is a branch of Information Security that deals specifically with security of websites, web applications and web services. Simply, Web Application Security is ―The securing of web applications‖. Web applications are one of the most prevalent platforms for information and services delivery over Internet today. As they are increasingly used for critical services, web appli...
متن کاملAn Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Unfortunately, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Ra...
متن کاملSensor Management Mechanism for Sensor Integrity in Active Security Technology
As network has become more distributed, more global, and more complex, it has simultaneously become more exposed to threats and cyber terrors. In this paper, we suggest active security technology using sensors in active network, and sensor management mechanism using managing sensors. Also, we manage requirements for managing sensors in active security technology. It can be distinguished active ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Research and Science
سال: 2017
ISSN: 2395-6992
DOI: 10.25125/engineering-journal-ijoer-nov-2017-9