To see the other types of publications on this topic, follow the link: Security of application, web application, Spring.

Dissertations / Theses on the topic 'Security of application, web application, Spring'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security of application, web application, Spring.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Wanderydz, Kristoffer. "WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2370.

Full text
Abstract:
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web applications. Has been collected and analyzed. Each vulnerability collected in this project, was exploited and secured. Demon- strations from a web application prototype, developed for this project. Brings real examples for each vulnerability, both secured, and insecured. The proto- type ran on a Tomcat web server, and was developed with frameworks such as Web, Spring and Hibernate. Connected to one PostgreSQL data source. All vulnerabilities was successfully implemented in Spring framework, and
APA, Harvard, Vancouver, ISO, and other styles
2

Líbal, Tomáš. "Aplikace pro přípravu zkoušek." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449290.

Full text
Abstract:
This thesis deals with the issue of preparation of final exams at the Faculty of Information Technology of Brno University of Technology. It describes the process of design and implementation of a web application that allows teachers to create and manage room schemes and terms of individual exams. An important part of the application is also the automatic placement of students in the rooms and the generation of individual exam assignments for printing based on the given template and the method of placement. The application provides students with a clear view of individual exam terms and detail
APA, Harvard, Vancouver, ISO, and other styles
3

Charpentier, Rojas Jose Enrique. "Web application Security." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Full text
Abstract:
Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and program but also which language and structure they use to code. Not only programmers but Software companies left holes in the software they developed of course without intention.Because is proven that most of the vulnerabilities start in the web application side, as developers we need to follow certain principles, test our code and learn as much as possible about the subject, as a foundation of web application security in order to know how to prevent is
APA, Harvard, Vancouver, ISO, and other styles
4

Foss, Julie-Marie, and Nina Ingvaldsen. "Web Application Security." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9235.

Full text
Abstract:
<p>As more and more sensitive information is entering web based applications, and thus are available through a web browser, securing these systems is of increasing importance. A software system accessible through the web is continuously exposed to threats, and is accessible to anyone who would like to attempt a break-in. These systems can not rely on only external measures like separate network zones and firewalls for security. Symantecs1 Internet Security Threat Report [34] is published every six months. Main findings in the last one published prove that there is an increase in threats to c
APA, Harvard, Vancouver, ISO, and other styles
5

Ødegård, Leif. "Framework Support for Web Application Security." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9314.

Full text
Abstract:
<p>There are several good reasons to use a framework when you are developing a new web application. We often here that: *** frameworks use known patterns that result in an easily extendable architecture *** frameworks result in loose couplings between different modules in the application *** frameworks allow developer to concentrate on business logic instead of reinventing wheels that is already reinvented several times *** frameworks are often thoroughly tested and contains less bugs than custom solutions But security is rarely mentioned in this setting. Our main motivation in this thesi
APA, Harvard, Vancouver, ISO, and other styles
6

Nilsson, Daniel, and Hampus Åberg. "HTML5 Web application security with OWASP." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2074.

Full text
Abstract:
HTML5 has gained a lot of interest the last couple of years from web developers. HTML5 is the new upcoming standard for HTML set to be released in the end of 2014 (W3C). In this report HTML5 is reviewed in order to determine if it has made web applications more secure. This is done with information study and the use of experimental test cases. We use the latest OWASP top ten list of security risks in web applications as a benchmark. As a result we found ve correlations between OWASP top ten list and HTML5 functionality. The results clearly indicates that HTML5 is a ecting web application secur
APA, Harvard, Vancouver, ISO, and other styles
7

Redfield, Catherine M. S. "Practical security for multi-user web application databases." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76820.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (p. 67-68).<br>Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators ca
APA, Harvard, Vancouver, ISO, and other styles
8

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Full text
Abstract:
The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. Existing misuse and anomaly-based detection and prevention techniques fail to cope with the volume and sophistication of new attacks that are continuously appearing, which suggests that there is a need t
APA, Harvard, Vancouver, ISO, and other styles
9

Panchal, Hardikkumar B. "A web application based on the MVC architecture using the Spring Framework." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10196389.

Full text
Abstract:
<p> In the field of software engineering, the Model-View-Controller (MVC) architecture was a great breakthrough that was introduced in the 1970s. It is an architectural pattern that is useful for structuring software applications. MVC divides an application into three components: 1) Model, 2) View, and 3) Controller. This separation provides great modularity, which results in ease of maintenance for systems employing this architecture. A software framework is a collection of modules and connectors that embody a given software architecture. In the spirit of software reuse, the Spring Framework
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Wei. "Replacing a monolithic web application with a new backend framework." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254937.

Full text
Abstract:
Web Technologies, particularly the web application, have become an essential component of the business world in our daily life. By utilizing the web application, it is convenient for human beings to search the information, make the payment and communicate with others through Internet. However, according to a report from the Society of Digital Agencies, 77% of companies believe that poor website user experience is a weakness for their clients, which making poor user experience the most significant weakness agencies identified. As for current monolithic web application of booking course system,
APA, Harvard, Vancouver, ISO, and other styles
11

Moosa, Asaad. "Neural virtual immune system : a next generation web application security framework." Thesis, University of Reading, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.559257.

Full text
Abstract:
The problem of zero-day attacks in web applications stands as one of the primary challenges against the development of the Internet technology. Solutions so far are not adequate at preventing attacks. The philosophical reasons behind this continuous failure are due to the reliance on out-dated methodologies that offer only signatures-based and anomaly detection solutions. In the last decade, a promising direction in security research utilises biologically inspired computing in which Artificial Immune Systems (AISs) were progressively investigated. Several AIS algorithms and frameworks were int
APA, Harvard, Vancouver, ISO, and other styles
12

Ademi, Muhamet. "Web-Based Intrusion Detection System." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20271.

Full text
Abstract:
Web applications are growing rapidly and as the amount of web sites globallyincreases so do security threats. Complex applications often interact with thirdparty services and databases to fetch information and often interactions requireuser input. Intruders are targeting web applications specifically and they are ahuge security threat to organizations and a way to combat this is to haveintrusion detection systems. Most common web attack methods are wellresearched and documented however due to time constraints developers oftenwrite applications fast and may not implement the best security pract
APA, Harvard, Vancouver, ISO, and other styles
13

Vernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.

Full text
Abstract:
As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. Meanwhile, the threats against web applications are scaling up where the attacker is not in need of much experience or knowledge to hack a poorly secured web application as the service easily can be accessed over the Internet. While common attacks such as cross-site scripting and SQL inject
APA, Harvard, Vancouver, ISO, and other styles
14

Rehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.

Full text
Abstract:
Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of products,shortened development cycles and heightened expectations of quality. MDD(Model Driven Development) has been counting as an exciting and magicaldevelopment approach in the software industry from several years. The ideabehind MDD is the separation of business logic of a system from its implementationdetails expressing problem domain using models. This separation andmodeling of p
APA, Harvard, Vancouver, ISO, and other styles
15

Shelly, David Andrew. "Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/34464.

Full text
Abstract:
The threat of cyber attacks due to improper security is a real and evolving danger. Corporate and personal data is breached and lost because of web application vulnerabilities thousands of times every year. The large number of cyber attacks can partially be attributed to the fact that web application vulnerability scanners are not used by web site administrators to scan for flaws. Web application vulnerability scanners are tools that can be used by network administrators and security experts to help prevent and detect vulnerabilities such as SQL injection, buffer overflows, cross-site scriptin
APA, Harvard, Vancouver, ISO, and other styles
16

Viterna, David. "Výuka vývoje webové aplikace ve frameworku Spring." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-205656.

Full text
Abstract:
The thesis deals with the analysis of commonly available textbooks for the development of the Spring framework. Identifies weaknesses of these textbooks and uses them to de-sign their own way of writing textbooks. Individual stages of development are demon-strated on a sample application that is initially designed with respect to real requirements for web application and interconnection of different technologies. During the incremental development of the application, the implementation methods are described together with the solution of the problems that have occurred.
APA, Harvard, Vancouver, ISO, and other styles
17

Zavadilová, Patrícia. "Návrh, tvorba a implementace softwarové aplikace ve firemním prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444603.

Full text
Abstract:
The master’s thesis is focused on the design and creation of a solution for converting company’s software application into the mobile and web form. The main goal is make business processes more efficient and maintain information and cyber security. The result should be a system that brings an innovative and convenient solution, time and financial savings.
APA, Harvard, Vancouver, ISO, and other styles
18

Sowmya, Mathukumalli. "Job search portal." Kansas State University, 2016. http://hdl.handle.net/2097/34518.

Full text
Abstract:
Master of Science<br>Department of Computer Science<br>Mitchell L. Neilsen<br>Finding jobs that best suits the interests and skill set is quite a challenging task for the job seekers. The difficulties arise from not having proper knowledge on the organization’s objective, their work culture and current job openings. In addition, finding the right candidate with desired qualifications to fill their current job openings is an important task for the recruiters of any organization. Online Job Search Portals have certainly made job seeking convenient on both sides. Job Portal is the solution where
APA, Harvard, Vancouver, ISO, and other styles
19

Metin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.

Full text
Abstract:
Different solutions have been used for each security aspects (access control, application security) to secure enterprise web applications. However combining &quot<br>enterprise-level&quot<br>and &quot<br>application-level&quot<br>security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security.
APA, Harvard, Vancouver, ISO, and other styles
20

Scrobonia, David. "Rules Based Analysis Engine for Application Layer IDS." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1773.

Full text
Abstract:
Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by obser
APA, Harvard, Vancouver, ISO, and other styles
21

Skoruppa, Malte Horst Arthur [Verfasser], and Michael [Akademischer Betreuer] Backes. "Automated Security Analysis of Web Application Technologies / Malte Horst Arthur Skoruppa ; Betreuer: Michael Backes." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2017. http://d-nb.info/1152095013/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Skoruppa, Malte Horst Arthur Verfasser], and Michael [Akademischer Betreuer] [Backes. "Automated Security Analysis of Web Application Technologies / Malte Horst Arthur Skoruppa ; Betreuer: Michael Backes." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:291-scidok-ds-269724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Tölg, Jan. "Porovnání frameworků Nette a Java Spring pro vývoj webových aplikací." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193882.

Full text
Abstract:
This thesis is focused on a comparison of two frameworks, built on two different platforms. The first one is a PHP-based framework Nette and the second one is Spring, developed in Java. They both are popular choices of frameworks on their respective platforms. The first part of the thesis' target is to introduce the reader to elementary ideas related to frameworks - design pattern MVC. The second part describes the Nette framework, the third is devoted to Spring framework. The fourth part deals with an example application and it's realization in both Nette and Spring, and the fifth and last pa
APA, Harvard, Vancouver, ISO, and other styles
24

Fonda, Maxime. "Protection obligatoire des serveurs d’applications Web : application aux processus métiers." Thesis, Orléans, 2014. http://www.theses.fr/2014ORLE2011/document.

Full text
Abstract:
Dans cette thèse, nous nous intéressons au contrôle d’accès obligatoire dans les serveurs d’applications Web. Nous présentons une approche de protection obligatoire fondée sur un modèle abstrait d’applications Web. Les modèles d’applications Web existants, comme par exemple SOA peuvent être représentés par ce modèle abstrait d’application. Notre protection obligatoire s’appuie sur un langage de protection dédié permettant d’exprimer les besoins en terme de contrôle d’accès au sein d’un serveur d’application Web. Ce langage de protection utilise notre modèle d’application pour contrôler de mani
APA, Harvard, Vancouver, ISO, and other styles
25

Mores, Martin. "Program pro plánování rozvrhů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-432986.

Full text
Abstract:
The topic of this thesis is schedule planning for Faculty of Information Technology (FIT) BUT. Thesis describes the process of creating a schedule at FIT and the information concerning study at FIT that are pertinent to this process. It presents the design and implementation of an application designed to support schedule planning at FIT. The primary focus of this thesis is to simplify and expedite the process of checking, if the schedule being planned is correct. The product of this thesis is a functional application used for schedule planning at FIT, in conjunction with one other application.
APA, Harvard, Vancouver, ISO, and other styles
26

Nguyen, Huy Manh. "MABIC: Mobile Application Builder for Interactive Communication." TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.

Full text
Abstract:
Nowadays, the web services and mobile technology advance to a whole new level. These technologies make the modern communication faster and more convenient than the traditional way. People can also easily share data, picture, image and video instantly. It also saves time and money. For example: sending an email or text message is cheaper and faster than a letter. Interactive communication allows the instant exchange of feedback and enables two-way communication between people and people, or people and computer. It increases the engagement of sender and receiver in communication. Although many s
APA, Harvard, Vancouver, ISO, and other styles
27

Perry, Sonja Michele. "An integrated intranet and dynamic database application for the Security Manager at Naval Postgraduate School." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FPerry.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Randy L. Borchardt, Dan C. Boger. Includes bibliographical references (p. 67). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
28

Ur-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.

Full text
Abstract:
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices. Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large. In some cases software applications are found to carry vulnerabilities for many years before being identified. A recent such example is the popular Heart Bleed Bug in the Open SSL/TSL. In today’s world,
APA, Harvard, Vancouver, ISO, and other styles
29

Khalil, Rana Fouad. "Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-box Web Vulnerability Scanners." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38595.

Full text
Abstract:
Black-box web application vulnerability scanners are automated tools that are used to crawl a web application to look for vulnerabilities. These tools are often used in one of two ways. In the first approach, scanners are used as Point-and-Shoot tools where a scanner is only given the root URL of an application and asked to scan the site. Whereas, in the second approach, scanners are first configured to maximize the crawling coverage and vulnerability detection accuracy. Although the performance of leading commercial scanners has been thoroughly studied, very little research has been done to e
APA, Harvard, Vancouver, ISO, and other styles
30

Yadavalli, Siri Chandana. "Smart Parking System." Kansas State University, 2016. http://hdl.handle.net/2097/32653.

Full text
Abstract:
Master of Science<br>Department of Computing and Information Sciences<br>Daniel A. Andresen<br>Locating a parking spot during peak hours in most populated areas like shopping malls, universities, exhibitions or convention centers is difficult for the drivers. The difficulty rises from not knowing where the available spots may be at that required time. Smart parking is a solution to metropolitan cities to reduce congestion, cut vehicle emission totals and save persons' time by helping them in finding a spot to park. Smart Parking is a parking system, usually a new one that is equipped with spe
APA, Harvard, Vancouver, ISO, and other styles
31

Xiong, Pulei. "A Model-driven Penetration Test Framework for Web Applications." Thesis, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20552.

Full text
Abstract:
Penetration testing is widely used in industry as a test method for web application security assessment. However, penetration testing is often performed late in a software development life cycle as an isolated task and usually requires specialized security experts. There is no well-defined test framework providing guidance and support to general testers who usually do not have in-depth security expertise to perform a systematic and cost-efficient penetration test campaign throughout a security-oriented software development life cycle. In this thesis, we propose a model-driven penetration test
APA, Harvard, Vancouver, ISO, and other styles
32

Jindráček, Petr. "Frameworky pro rychlý vývoj webových aplikací Ruby on Rails a Spring Roo." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-192446.

Full text
Abstract:
The topic of this master's thesis is a comparison of web Rapid Application Development frameworks Ruby on Rails and Spring Roo. The paper focuses on creating extensive overview of pros and cons of the subjected tools from the web developer's point of view to enhance his awareness about the subject, also to come up with new questions for further analysis or even convince him to use one of the frameworks in the real projects. Firstly, the paper contains a theoretical overview of the common conceptions for better understanding of the following parts and then specific principles for each of the se
APA, Harvard, Vancouver, ISO, and other styles
33

Sagayam, Arul Thileeban. "LIDS: An Extended LSTM Based Web Intrusion Detection System With Active and Distributed Learning." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103471.

Full text
Abstract:
Intrusion detection systems are an integral part of web application security. As Internet use continues to increase, the demand for fast, accurate intrusion detection systems has grown. Various IDSs like Snort, Zeek, Solarwinds SEM, and Sleuth9, detect malicious intent based on existing patterns of attack. While these systems are widely deployed, there are limitations with their approach, and anomaly-based IDSs that classify baseline behavior and trigger on deviations were developed to address their shortcomings. Existing anomaly-based IDSs have limitations that are typical of any machine lea
APA, Harvard, Vancouver, ISO, and other styles
34

Sigurdsson, Victoria. "Untangling the Web : Finding Your Forgotten Assets." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16579.

Full text
Abstract:
Background. In the years between 2016 and 2017, the number of attacks against web application increased by approximately 21.89 percent. The total recorded amount of incidents during 2017 was 6,502. To assure security, patching and scanning are required. This assumes that the company is aware of all their external facing web applications. The company Outpost24 is observing an increased request for a solution capable of finding all external web application owned by one company. Objectives. This thesis study six methods to identify assets owned by one company. The methods are classified into weak
APA, Harvard, Vancouver, ISO, and other styles
35

Jia, Hao. "A web application for Medasolution Healthcare Company customer service system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2612.

Full text
Abstract:
Medasolution is a virtual company designed by the author to handle Medicare insurance business. The web application (which uses ASP.net and SQL Server 2000) facilitates communication between Medasolution and all its clients: members, employers, brokers, and medicare providers through separate web pages based on their category levels. The program incorporates security so that it follows government privacy rules regarding client information.
APA, Harvard, Vancouver, ISO, and other styles
36

Ziegler, Luciano. "Development of the Web-Based Admissions and Management System for IELP." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/104.

Full text
Abstract:
The academic program The Intensive English Language Program (IELP) at the University of New Orleans (UNO) offers one of the most effective and diverse language programs in the United States. This thesis is to report the development of the Webbased database application that manages admissions, students learning progress, and course offering of this program. The system development followed a simplified Unified Process for Software Development (UP) using the Unified Modeling Language (UML) models such as the requirement catch model – use cases, the analysis model – activity diagrams, and the desi
APA, Harvard, Vancouver, ISO, and other styles
37

Janyš, Martin. "Automatická koordinace a řízení procesů na platformě Java." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234986.

Full text
Abstract:
The subject of this thesis is the topic of the resilience and stability of web applications with a focus on the Java platform. Many existing information systems based not only upon this platform face problems that disturb the stability of applications. These problems may result in the failure, downtime and, consequently, financial or business loss due to the malfunction of the whole service. The aim is to show the problems that the applications face in a production environment and to show how to address them proactively. A possible partial solution to increase the stability may be an appropria
APA, Harvard, Vancouver, ISO, and other styles
38

Lunyov, Phillip. "Detecting changes in web applications." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97021.

Full text
Abstract:
As the availability and popularity of the Internet continues to grow, the trend ofproviding global access to business resources and services online is an efficient andprofitable way for organizations to acquire a new share of the market. Due to the flexibilityand scalability of modern web technologies, web-based applications processand store personal or critical information in enormous amounts. Hence, the overallapplication’s functionality and secure data processing are the main key factors ofeach web application. For ensuring those key factors, the web page code must be regularlymonitored to
APA, Harvard, Vancouver, ISO, and other styles
39

Ottosson, Henrik, and Per Lindquist. "Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581.

Full text
Abstract:
Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its users. Penetration testing (or ethical hacking) has long been one of the primary methods to detect vulnerabilities against such attacks, but is costly and requires considerable ability and knowledge. As this expertise remains largely individual and undocumented, the industry remains based on expertise. A lack of comprehensive methodologies at levels that are accessible to inexperienced ethical hackers is clearly observable. While attempts at automating t
APA, Harvard, Vancouver, ISO, and other styles
40

Nadipelly, Vinaykumar. "Dynamic Scoping for Browser Based Access Control System." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1149.

Full text
Abstract:
We have inorganically increased the use of web applications to the point of using them for almost everything and making them an essential part of our everyday lives. As a result, the enhancement of privacy and security policies for the web applications is becoming increasingly essential. The importance and stateless nature of the web infrastructure made the web a preferred target of attacks. The current web access control system is a reason behind the victory of attacks. The current web consists of two major components, the browser and the server, where the effective access control system need
APA, Harvard, Vancouver, ISO, and other styles
41

Svanemark, Carl-Henrik, and Jong Joakim de. "Definition av säkerhetsevaluering." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-4162.

Full text
Abstract:
<p>Detta examensarbete har gjorts på uppdrag av Compare Testlab på Sätterstrand, Hammarö. Målet med arbetet var att definera en uppsättning frågor och punkter som ska vara med i ett lättviktstest med inriktning på säkerhet. Efter mycket studier av böcker och webbsidor kom vi fram till att det inte var så lätt som vi trodde att definera ett allmänt säkerhetstest för mjukvaror eller applikationer. Efter samtal med uppdragsgivaren bestämdes det att arbetet skulle begränsas till webbapplikationer.Internet används mer och mer för varje år som går och det dyker upp nya webbapplikationer i snabbare tak
APA, Harvard, Vancouver, ISO, and other styles
42

Šimko, Daniel. "Zabezpečení a architektura správce IPTV vysílání." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217278.

Full text
Abstract:
The aim of my thesis is to analyze, propose and implement the application of IPTV Manager.The analysis probes the requirements for the application and its results are displayed in UML diagrams. The proposal is mainly focused on application's architecture and on the choice of modern technologies that faciliate its realisation.The security of the application is highly emphasized in the proposal and in the implementation itself.
APA, Harvard, Vancouver, ISO, and other styles
43

Zelenka, Pavel. "Webová aplikace na platformě JAVA pro odevzdávání dat a jejich vyhodnocení." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220315.

Full text
Abstract:
This project mainly refers to use of the Java programming language for developing web application for organizing challenges focused on biomedical data. The project is focused on the comparison and selection of tools for developing and running application on server. The project includes a database schema, source code of application and basic development documentation.
APA, Harvard, Vancouver, ISO, and other styles
44

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Full text
Abstract:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research
APA, Harvard, Vancouver, ISO, and other styles
45

Dahl, Andreas, and Kristofer Nylander. "Differences in security between native applications and web based applications in the field of health care." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-40397.

Full text
Abstract:
Developing native applications for different platforms with different resolutions and screen sizes is both time consuming and costly. If developers were able to develop one web based application which can be used on multiple platforms, yet retain the same level of security as a native application, they would be able to reduce both development time and costs. In this thesis we will investigate the possibilities of achieving a level of security in a web-based application that can equal that of a native application, as well as how to develop an application that uses the Mina Vårdkontakter (My He
APA, Harvard, Vancouver, ISO, and other styles
46

Colombo, Regina Maria Thienne. "Proposta de uma metodologia de medição e priorização de segurança de acesso para aplicações WEB." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3136/tde-23122014-142055/.

Full text
Abstract:
Em um mundo tecnológico e globalmente interconectado, em que indivíduos e organizações executam transações na web com frequência, a questão da segurança de software é imprescindível, ela é necessária em diversos nichos: segurança das redes de computadores, dos computadores e dos softwares. A implantação de um sistema de segurança que abrange todos os aspectos é extensa e complexa, ao mesmo tempo em que a exploração de vulnerabilidades e ataques é exponencialmente crescente. Por causa da natureza do software e de sua disponibilidade na web, a garantia de segurança nunca será total, porém é poss
APA, Harvard, Vancouver, ISO, and other styles
47

Avanesov, Tigran. "Résolution de contraintes de déductibilité : application à la composition de services Web sécurisés." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00641237.

Full text
Abstract:
Les contraintes de déductibilité ont été introduites pour vérifier les protocoles cryptographiques. Cette thèse présente une procédure de décision pour le problème de satisfaisabilité des systèmes généraux de contraintes de déductibilité. Deux cas sont envisagés: la théorie de Dolev-Yao standard et son extension par un opérateur associatif, commutatif, idempotent. Le résultat est utilisé pour résoudre le problème de l'orchestration automatique et distribué de services Web sécurisés. Comme seconde application nous proposons une procédure pour décider la sécurité d'un nombre fini de sessions de
APA, Harvard, Vancouver, ISO, and other styles
48

Stříž, Martin. "Platforma pro vývoj RIA aplikací." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236954.

Full text
Abstract:
Práce má za cíl navrhnout a implementovat plaftormu pro interaktivní webové aplikace (Rich Internet Application - RIA) na základě vhodných technologíí pro programovací jazyky Java a JavaScript. Důraz je kladen na výběr odpovídající sady softwarových knihoven, používání principů správného objektově-orientovaného návrhu a programování a možnost dlouhodobé údržby výsledné aplikace.
APA, Harvard, Vancouver, ISO, and other styles
49

Červenka, Lukáš. "Výsledkový systém pro Euro hry Doksy." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-198425.

Full text
Abstract:
The main objective of this diploma thesis is the analysis of current result management sys-tem of Euro hry Doksy competition and then design and implementation of a new result management system. The first chapters focus on the analysis of current state of the system, its context and the disadvantages of using the system. After analysis there is a part that specifies the requirements, based on the results of the analysis and interviews with the or-ganizers of the competition. Next part of the thesis describes the design of the new applica-tion, which would suit the organizers better. The design
APA, Harvard, Vancouver, ISO, and other styles
50

Su, Ziyi. "Application de gestion des droits numériques au système d'information d'entreprise." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00737777.

Full text
Abstract:
Pour faire face aux enjeux d'une économie mondialisée et aux fluctuations du marché, les entreprises (et principalement les PMEs) doivent développer de nouvelles stratégies de collaboration et d'organisation en réseau permettant de s'intéresser effectivement au réseau de création de valeur (et non pas se limiter à une simple organisation de chaîne de valeur) plus en rapport avec le contexte économique " blue ocean " visant le développement de produits et services innovants. Actuellement, ces réseaux de collaborations sont basés sur des relations de confiance et des communautés bien identifiées
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!