Matches in SemOpenAlex for { <https://semopenalex.org/work/W1564377853> ?p ?o ?g. }
Showing items 1 to 93 of
93
with 100 items per page.
- W1564377853 endingPage "394" @default.
- W1564377853 startingPage "363" @default.
- W1564377853 abstract "In the last few years, the popularity of web-based applications has grown tremendously. A number of factors have led an increasing number of organizations and individuals to rely on web-based applications to provide access to a variety of services. Today, web-based applications are routinely used in security-critical environments, such as medical, financial, and military systems.Web-based systems are a composition of infrastructure components, such as web servers and databases, and of application-specific code, such as HTML-embedded scripts and server-side CGI programs. While the infrastructure components are usually developed by experienced programmers with solid security skills, the application-specific code is often developed under strict time constraints by programmers with little security training. As a result, vulnerable web-based applications are deployed and made available to the whole Internet, creating easily exploitable entry points for the compromise of entire networks.To ameliorate these security problems, it is necessary to develop tools and techniques to improve the security of web-based applications. The most effective approach would be to provide secure mechanisms that can be used by well-trained developers. Unfortunately, this is not always possible, and a second line of defense is represented by auditing the application code for possible security problems. This activity, often referred to as web vulnerability analysis, allows one to identify security problems in web-based applications at early stages of development and deployment.Recently, a number of methodologies and tools have been proposed to support the assessment of the security of web-based applications. In this chapter, we survey the current approaches to web vulnerability analysis and we propose a classification along two characterizing axes: detection model and analysis technique. We also present the most common attacks against web-based applications and discuss the effectiveness of certain analysis techniques in identifying specific classes of flaws." @default.
- W1564377853 created "2016-06-24" @default.
- W1564377853 creator A5006916505 @default.
- W1564377853 creator A5062135330 @default.
- W1564377853 creator A5075685499 @default.
- W1564377853 date "2007-09-12" @default.
- W1564377853 modified "2023-09-23" @default.
- W1564377853 title "Vulnerability Analysis of Web-based Applications" @default.
- W1564377853 cites W1511560695 @default.
- W1564377853 cites W1983142587 @default.
- W1564377853 cites W2001693166 @default.
- W1564377853 cites W2085925880 @default.
- W1564377853 cites W2103378897 @default.
- W1564377853 cites W2107604680 @default.
- W1564377853 cites W2110523863 @default.
- W1564377853 cites W2135143063 @default.
- W1564377853 cites W2144696387 @default.
- W1564377853 cites W2148001343 @default.
- W1564377853 cites W2158600037 @default.
- W1564377853 cites W2161688581 @default.
- W1564377853 cites W2553945548 @default.
- W1564377853 cites W4232808412 @default.
- W1564377853 cites W4240309233 @default.
- W1564377853 doi "https://doi.org/10.1007/978-3-540-72912-9_13" @default.
- W1564377853 hasPublicationYear "2007" @default.
- W1564377853 type Work @default.
- W1564377853 sameAs 1564377853 @default.
- W1564377853 citedByCount "14" @default.
- W1564377853 countsByYear W15643778532012 @default.
- W1564377853 countsByYear W15643778532014 @default.
- W1564377853 countsByYear W15643778532020 @default.
- W1564377853 countsByYear W15643778532022 @default.
- W1564377853 crossrefType "book-chapter" @default.
- W1564377853 hasAuthorship W1564377853A5006916505 @default.
- W1564377853 hasAuthorship W1564377853A5062135330 @default.
- W1564377853 hasAuthorship W1564377853A5075685499 @default.
- W1564377853 hasBestOaLocation W15643778532 @default.
- W1564377853 hasConcept C110875604 @default.
- W1564377853 hasConcept C11392498 @default.
- W1564377853 hasConcept C118643609 @default.
- W1564377853 hasConcept C130436687 @default.
- W1564377853 hasConcept C136764020 @default.
- W1564377853 hasConcept C182321512 @default.
- W1564377853 hasConcept C22111027 @default.
- W1564377853 hasConcept C22680326 @default.
- W1564377853 hasConcept C29983905 @default.
- W1564377853 hasConcept C35578498 @default.
- W1564377853 hasConcept C38652104 @default.
- W1564377853 hasConcept C39569185 @default.
- W1564377853 hasConcept C41008148 @default.
- W1564377853 hasConcept C527648132 @default.
- W1564377853 hasConcept C59241245 @default.
- W1564377853 hasConcept C62913178 @default.
- W1564377853 hasConcept C79373723 @default.
- W1564377853 hasConcept C97200028 @default.
- W1564377853 hasConceptScore W1564377853C110875604 @default.
- W1564377853 hasConceptScore W1564377853C11392498 @default.
- W1564377853 hasConceptScore W1564377853C118643609 @default.
- W1564377853 hasConceptScore W1564377853C130436687 @default.
- W1564377853 hasConceptScore W1564377853C136764020 @default.
- W1564377853 hasConceptScore W1564377853C182321512 @default.
- W1564377853 hasConceptScore W1564377853C22111027 @default.
- W1564377853 hasConceptScore W1564377853C22680326 @default.
- W1564377853 hasConceptScore W1564377853C29983905 @default.
- W1564377853 hasConceptScore W1564377853C35578498 @default.
- W1564377853 hasConceptScore W1564377853C38652104 @default.
- W1564377853 hasConceptScore W1564377853C39569185 @default.
- W1564377853 hasConceptScore W1564377853C41008148 @default.
- W1564377853 hasConceptScore W1564377853C527648132 @default.
- W1564377853 hasConceptScore W1564377853C59241245 @default.
- W1564377853 hasConceptScore W1564377853C62913178 @default.
- W1564377853 hasConceptScore W1564377853C79373723 @default.
- W1564377853 hasConceptScore W1564377853C97200028 @default.
- W1564377853 hasLocation W15643778531 @default.
- W1564377853 hasLocation W15643778532 @default.
- W1564377853 hasOpenAccess W1564377853 @default.
- W1564377853 hasPrimaryLocation W15643778531 @default.
- W1564377853 hasRelatedWork W1531015913 @default.
- W1564377853 hasRelatedWork W2016613525 @default.
- W1564377853 hasRelatedWork W2333600084 @default.
- W1564377853 hasRelatedWork W2351952988 @default.
- W1564377853 hasRelatedWork W2767768654 @default.
- W1564377853 hasRelatedWork W2913452075 @default.
- W1564377853 hasRelatedWork W4214947963 @default.
- W1564377853 hasRelatedWork W4283399932 @default.
- W1564377853 hasRelatedWork W2397476862 @default.
- W1564377853 hasRelatedWork W3140034589 @default.
- W1564377853 isParatext "false" @default.
- W1564377853 isRetracted "false" @default.
- W1564377853 magId "1564377853" @default.
- W1564377853 workType "book-chapter" @default.