نتایج جستجو برای: web security
تعداد نتایج: 387707 فیلتر نتایج به سال:
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key facto...
Model Driven Architecture is an approach to increase the quality of complex software systems by creating high-level system models and automatically generating system architectures and components out of these models. We show how this paradigm can be applied to what we call Model Driven Security for inter-organizational workflows in e-government. Our focus is on the realization of security-critic...
The paper provides a survey research report on the information security and communication management disciplines within the scope of Web Banking. The benefits and uses of information and communication approaches were examined to determine their influence on the effective management of web banking security risks. Information and communication approaches have not changed the structure of security...
Currently, there are a large number of heterogeneous platforms. The standards of Web Services in different platforms are different and complex. Therefore, security interaction of Web services based on heterogeneous platform has become increasingly prominent. In order to realize security interaction of heterogeneous platforms, a security interactive model of Web Service based on WebSphere and .N...
To protect sensitive user data against server-side attacks, a number of security-conscious web applications have turned to client-side encryption, where only encrypted user data is ever stored in the cloud. We formally investigate the security of a number of such applications, including password managers, cloud storage providers, an e-voting website and a conference management system. We find t...
Security of dynamic web applications is a serious issue. While Model Driven Architecture (MDA) techniques can be used to generate applications with given access control security properties, analysis of existing web applications is more problematic. In this paper we present a model transformation technique to automatically construct a role-based access control (RBAC) security model of dynamic we...
In the Web environment web log file capture operational data generated through internet for analysing user’s browsing behaviour and many other security issues. The captured operational data is useful for build use profile, web designing and acts as evidence in web forensic and many other security issues. In real world there are lots systems that participate in web environment having incomplete ...
This paper presents an analysis of security aspect of Web-Based applications that utilize Service Oriented Architecture (SOA). The architectural solutions which address security requirements are examined and compared with other quality attributes relevant to web-based systems. More specifically, a trade off analysis in which security is the main focus is performed to select an architecture that...
Authentication is the process of making sure that the person who is requesting a web service is really the person that they claim to be. This is done by requiring the user to provide a set of credentials. In return, they will receive a security token that can be used to access the server. The credentials usually take the form of a user id and password. On the other hand, the security token that...
Security systems play an important role in the protection of lives and investment. The aim of this project is to design an efficient and cheap security system, which is accessible from any part of the world through the internet, and can be employed in every facet of the economy. This is achieved by incorporating various subsystems (such as surveillance, intruder control, access control, fire de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید