Academic literature on the topic 'Web Applications; Storage; Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web Applications; Storage; Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Web Applications; Storage; Security"
Lyba, M. V., and L. Uhryn. "MODERN TOOLS FOR SECURITY TESTING FROM OWASP." Bulletin of Lviv State University of Life Safety 22 (December 28, 2020): 18–22. http://dx.doi.org/10.32447/20784643.22.2020.03.
Full textXie, Guo Bo, and Bing Ying Yao. "The Fingerprint Identification Technology is Applied to the Application Research of Web Cloud Storage Safety Certification." Applied Mechanics and Materials 536-537 (April 2014): 161–67. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.161.
Full textHuang, Lin Na. "Research and Application of Web Database Security Technology." Applied Mechanics and Materials 380-384 (August 2013): 2306–11. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2306.
Full textTofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (June 1, 2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.
Full textSrinivasu, N., O. Sree Priyanka, M. Prudhvi, and G. Meghana. "Multilevel classification of security threats in cloud computing." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 253. http://dx.doi.org/10.14419/ijet.v7i1.5.9157.
Full textPatel, Iishi, Sambhav Jain, J. K. Vishwajeet, Vibhuti Aggarwal, and Pragati Mehra. "Securing Electronic Healthcare Records in Web Applications." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 236–42. http://dx.doi.org/10.35940/ijeat.e2781.0610521.
Full textVivek Tammineedi, Venkata Satya, and V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Full textShinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (August 14, 2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Full textKellezi, Deina, Christian Boegelund, and Weizhi Meng. "Securing Open Banking with Model-View-Controller Architecture and OWASP." Wireless Communications and Mobile Computing 2021 (September 21, 2021): 1–13. http://dx.doi.org/10.1155/2021/8028073.
Full textAhirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (June 30, 2021): 30–35. http://dx.doi.org/10.51767/jc1204.
Full textDissertations / Theses on the topic "Web Applications; Storage; Security"
Lin, Wenghui. "Data Security Enhancement for Web Applications Using Cryptographic Back-end Store." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/235.
Full textPrabhakara, Deepak. "Web Applications Security : A security model for client-side web applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8962.
Full textThe Web has evolved to support sophisticated web applications. These web applications are exposed to a number of attacks and vulnerabilities. The existing security model is unable to cope with these increasing attacks and there is a need for a new security model that not only provides the required security but also supports recent advances like AJAX and mashups. The attacks on client-side Web Applications can be attributed to four main reasons – 1) lack of a security context for Web Browsers to take decisions on the legitimacy of requests, 2) inadequate JavaScript security, 3) lack of a Network Access Control and 4) lack of security in Cross-Domain Web Applications. This work explores these four reasons and proposes a new security model that attempts to improve overall security for Web Applications. The proposed security model allows developers of Web Applications to define fine-grained security policies and Web Browsers enforce these rules; analogous to a configurable firewall for each Web Application. The Browser has disallows all unauthorized requests, thus preventing most common attacks like Cross-Site Script Injections, Cross-Frame Scripting and Cross-Site Tracing. In addition the security model defines a framework for secure Cross-Domain Communication, thus allowing secure mashups of Web Services. The security model is backward compatible, does not affect the current usability of the Web Applications and has cross-platform applicability. The proposed security model was proven to protect against most common attacks, by a proof-of-concept implementation that was tested against a comprehensive list of known attacks.
Svartberg, Anja. "Security in Offline Web Applications." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for elektronikk og telekommunikasjon, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10003.
Full textOffline Web applications are increasingly popular. The possibility to have both the advantages of Web applications and traditional desktop applications is exiting. An offline Web application can be accessed from all computers, with any operating system, as well as offering to store information locally, giving the user the opportunity to use the application when the user does not have Internet access. The concept of offline Web applications is tempting, but it is important to integrate security in the process of making them. The users rely on a high level of security. In this thesis I have looked specifically on how the persistent client-side storage needed for offline storage for the offline Web application can be compromised due to security vulnerabilities on the Web server. I have performed a literature review to gather information on the topic of security in offline Web applications, and it was found that there has not been much previous research in this area. Two technologies for realization of offline Web applications were reviewed: HTML5 and Google Gears. Following, a Web server was set up, and two test applications with offline capabilities, representing the two chosen technologies, were put on the Web server. A set of security tests were performed on these test applications to reveal possible vulnerabilities in having persistent client-side storage. The results of the security testing demonstrate the consequences of having security weaknesses in Web servers hosting offline Web applications. If there is one cross-site scripting vulnerability on the Web server, an attacker can attack the persistent client-side storage: steal, change, delete or add information related to the offline Web application. Some thoughts on possible consequences of attacks on the hosting Web server are also given. A comparison between Google Gears and HTML5 was performed, and it was found that some of the design choices in Google Gears help provide a higher level of security in offline Web applications. Some strategies for testing the security of offline Web applications are suggested, focused on cross-site scripting vulnerabilities. The work in this thesis underlines the importance of including security in the process of developing and deploying offline Web applications. It shows the large consequences that can result from small security vulnerabilities present in the hosting Web server. Introductorily, the advantages of offline Web applications were discussed. The work presented here shows that the increasing use of offline Web applications relies on a high focus on security in order to keep the users' information safe.
Ge, Xiaocheng. "Agile security for Web applications." Thesis, University of York, 2007. http://etheses.whiterose.ac.uk/11071/.
Full textErdogan, Gencer. "Security Testing of Web Based Applications." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9993.
Full textWeb applications are becoming more and more popular in means of modern information interaction, which leads to a growth of the demand of Web applications. At the same time, Web application vulnerabilities are drastically increasing. This will inevitably expose more Web application users to malicious attacks, causing them to lose valuable information or be harmed in other ways. One of the most important software security practices that is used to mitigate the increasing number of vulnerabilities is security testing. The most commonly applied security testing methodologies today are extensive and are sometimes too complicated with their many activities and phases. Because of this complexity, developers very often tend to neglect the security testing process. Today, there is only a few security testing methodologies developed especially for Web applications and their agile development environment. It is therefore necessary to give attention to security testing methodologies for Web applications. A survey of state-of-the-art security testing methodologies for Web applications is performed. Based on some predefined criterions, Agile Security Testing is selected as the most adequate security testing methodology for Web applications, and is further extended to support all the predefined criterions. Furthermore, the extended Agile Security Testing methodology (EAST) is integrated into the Software Development Life Cycle applied by the Administrative Information Services group at the Department of General Infrastructure Services at CERN−The European Organization for Nuclear Research. Finally, by using the EAST methodology and the security testing methodology applied by the AIS group (which is an ad hoc way of performing security tests), an evaluation of the EAST methodology compared to existing ad hoc ways of performing security tests is made. The security testing process is carried out two times using the EAST methodology and two times using the ad hoc approach. In total, 9 vulnerability classes are tested. The factors that are used to measure the efficiency is: (1) the amount of time spent on the security testing process, (2) the amount of vulnerabilities found during the security testing process and (3) the ability to mitigate false-positives during the security testing process. The results show that the EAST methodology is approximately 21% more effective in average regarding time spent, approximately 95% more effective regarding the amount of vulnerabilities found, and has the ability to mitigate false-positives, compared to existing ad hoc ways of performing security tests. These results show that structured security testing of Web applications is possible not being too complicated with many activities and phases. Furthermore, it mitigates three important factors that are used as basis to neglect the security testing process. These factors are: The complexity of the testing process, the too time-consuming attitude against security testing of Web applications and that its considered to lack a significant payoff.
Srilatha, Rondla, and Gande Someshwar. "Security Testing for Web Applications in SDLC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2903.
Full text+91 8977404640
Singh, Kapil. "Designing security policies and frameworks for web applications." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41122.
Full textMundada, Yogesh. "Building data-centric security mechanisms for web applications." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55013.
Full textUr-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.
Full textNgu, Phuc Huy. "Web applications - New mobile service paradigm." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19040.
Full textBooks on the topic "Web Applications; Storage; Security"
Lipyeow, Lim, Wang Wei, Li Chuan, Chen Lei, and SpringerLink (Online service), eds. Web-Age Information Management: 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textTesting Web security: Assessing the security of Web sites and applications. Indianapolis, Ind: Wiley, 2002.
Find full textSplaine, Steve. Testing web security: Assessing the security of web sites and applications. Indianapolis: Wiley, 2002.
Find full textMike, Shema, ed. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Find full textScambray, Joel. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Find full textThe tangled Web: A guide to securing modern Web applications. San Francisco: No Starch Press, 2011.
Find full textVincent, Liu, and Sima Caleb, eds. Hacking exposed: Web applications : web application security secrets and solutions. 3rd ed. New York: McGraw-Hill, 2011.
Find full textWang, Jianyong. Web-Age Information Management: 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textAndreu, Andres. Professional pen testing for Web applications. Indianapolis, Ind: Wiley Pub., 2006.
Find full textBill, Ballad, ed. Securing PHP web applications. Upper Saddle River, NJ: Addison-Wesley, 2009.
Find full textBook chapters on the topic "Web Applications; Storage; Security"
Xu, Guosheng, Zhimin Wu, Chengze Li, Jinghua Yan, Jing Yuan, Zhiyong Wang, and Lu Wang. "Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 325–35. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24907-6_25.
Full textReagan, Rob. "Azure Table Storage." In Web Applications on Azure, 139–85. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2976-7_5.
Full textReagan, Rob. "Azure Data Storage Overview." In Web Applications on Azure, 61–76. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2976-7_3.
Full textWin, Khin-Myo, Wee-Keong Ng, and Ee-Peng Lim. "ENAXS: Efficient Native XML Storage System." In Web Technologies and Applications, 59–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36901-5_6.
Full textWen, Mi, Shui Yu, Jinguo Li, Hongwei Li, and Kejie Lu. "Big Data Storage Security." In Big Data Concepts, Theories, and Applications, 237–55. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27763-9_6.
Full textCerullo, Fabio E. "Deploying Secure Web Applications with OWASP Resources." In Web Application Security, 21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_11.
Full textGong, Fengguang, Wenting Huang, Hao Luo, and Hailong Zhu. "DNFStore:A Distributed Netflow Storage System Supports Fast Retrieval." In Web Technologies and Applications, 158–66. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11119-3_15.
Full textLee, Ho Jung, and Jung Hwan Song. "Designing Security Auditing Protocol with Web Browsers." In Information Security Applications, 364–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938_29.
Full textHu, Xiangyu, Haiwei Zhang, and Xiaojie Yuan. "A Compact XML Storage Scheme Supporting Efficient Path Querying." In Web Technologies and Applications, 711–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29253-8_68.
Full textChoi, Dae-Sik, Eul Gyu Im, and Cheol-Won Lee. "Intrusion-Tolerant System Design for Web Server Survivability." In Information Security Applications, 124–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_10.
Full textConference papers on the topic "Web Applications; Storage; Security"
Hassan, Sabri, and Günther Pernul. "Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics." In iiWAS '14: The 16th International Conference on Information Integration and Web-based Applications & Services. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2684200.2684333.
Full textWang, Yazhe, Shunan Ma, and Lei Ren. "A Security Framework for Cloud Manufacturing." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4082.
Full textZheng, Zhihao, Yao Zhang, Vinay Gurram, Jose Salazar Useche, Isabella Roth, and Yi Hu. "Best Practices in Designing and Implementing Cloud Authentication Schemes." In 7th International Conference on Advances in Computer Science and Information Technology (ACSTY 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110307.
Full textJain, Vijay, and Amol Kolambkar. "Modeling Web Attachment Storage for Web Applications." In 2014 21st Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2014. http://dx.doi.org/10.1109/apsec.2014.24.
Full textTanaskovic, Tamara M., and Miodrag Z. Zivkovic. "Security principles for web applications." In 2011 19th Telecommunications Forum Telfor (TELFOR). IEEE, 2011. http://dx.doi.org/10.1109/telfor.2011.6143843.
Full textKushe, Renelada. "Security Assessment of Web Applications." In University for Business and Technology International Conference. Pristina, Kosovo: University for Business and Technology, 2017. http://dx.doi.org/10.33107/ubt-ic.2017.189.
Full textLiu, Muyang, Ke Li, and Tao Chen. "Security testing of web applications." In GECCO '19: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319619.3322026.
Full textMatsumoto, Shinichi, and Kouichi Sakurai. "Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image." In 2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS). IEEE, 2014. http://dx.doi.org/10.1109/asiajcis.2014.30.
Full textYadav, Divyani, Deeksha Gupta, Dhananjay Singh, Devendra Kumar, and Upasana Sharma. "Vulnerabilities and Security of Web Applications." In 2018 4th International Conference on Computing Communication and Automation (ICCCA). IEEE, 2018. http://dx.doi.org/10.1109/ccaa.2018.8777558.
Full textTeodoro, Nuno, and Carlos Serrao. "Assessing the Portuguese Web applications security." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749875.
Full textReports on the topic "Web Applications; Storage; Security"
The Path Toward a Hydrogen Economy: How Industry Can Broaden the Use of Hydrogen. King Abdullah Petroleum Studies and Research Center, November 2020. http://dx.doi.org/10.30573/ks--2020-wb10.
Full text