The Experts below are selected from a list of 296079 Experts worldwide ranked by ideXlab platform
J D Meier - One of the best experts on this subject based on the ideXlab platform.
-
Web Application security engineering
IEEE Symposium on Security and Privacy, 2006Co-Authors: J D MeierAbstract:Integrating security throughout the life cycle can improve overall Web Application security. With a detailed review of the steps involved in applying security-specific activities throughout the software development life cycle, the author walks practitioners through effective, efficient Application design, development, and testing. With this article, the author shares a way to improve Web Application security by integrating security throughout the life cycle. The ideas he present here are based on empirical evidence from consulting with hundreds of customers - real-world scenarios with real project constraints and security concerns - across a variety of scenarios and putting into practice the security techniques that the experts know. The result is an approach that has evolved and refined itself over time
Min Choi - One of the best experts on this subject based on the ideXlab platform.
-
load balancing system for iptv Web Application virtualization
International Conference on Information and Communication Technology Convergence, 2013Co-Authors: Min ChoiAbstract:Web Applications are easy to develop and maintain. It is desirable to provide Web Application services to IPTV. However many legacy set-top boxes lack enough computing power to run Web Applications. Desktop virtualization technologies can be used to provide Web Application services to legacy set-top boxes. Multiple servers and a load balancing system are required to serve many clients. This paper describes a load balancing system for IPTV Web Application virtualization. The load balancing system distributes requests based on server loads and supports high availability.
-
ICTC - Load balancing system for IPTV Web Application virtualization
2013 International Conference on ICT Convergence (ICTC), 2013Co-Authors: Min ChoiAbstract:Web Applications are easy to develop and maintain. It is desirable to provide Web Application services to IPTV. However many legacy set-top boxes lack enough computing power to run Web Applications. Desktop virtualization technologies can be used to provide Web Application services to legacy set-top boxes. Multiple servers and a load balancing system are required to serve many clients. This paper describes a load balancing system for IPTV Web Application virtualization. The load balancing system distributes requests based on server loads and supports high availability.
-
a multi tenant Web Application framework for saas
International Conference on Cloud Computing, 2012Co-Authors: Min ChoiAbstract:Software as a Service (SaaS) is a software delivery model in which software resources are accessed remotely by users. Enterprises find SaaS attractive because of its low cost. SaaS requires sharing of Application servers among multiple tenants for low operational costs. Besides the sharing of Application servers, customizations are needed to meet requirements of each tenant. Supporting various levels of configuration and customization is desirable for SaaS frameworks. This paper describes a multi-tenant Web Application framework for SaaS. The proposed framework supports runtime customizations of user interfaces and business logics by use of file-level namespaces, inheritance, and polymorphism. It supports various client-side Web Application technologies.
Jaecheol Ryou - One of the best experts on this subject based on the ideXlab platform.
-
A Design and Implementation of Profile Based Web Application Securing Proxy
Information Security Practice and Experience, 2006Co-Authors: Youngtae Yun, Yosik Kim, Sangseo Park, Jaecheol RyouAbstract:Recently, the security threat on Web Application is increasing rapidly and especially open source Web Applications are becoming popular target of Web server hacking. And more there was a worm which spread via Web Application vulnerabilities. Web Application attack uses the vulnerability not in Web server itself, but in structural, logical, and code errors. The majority of flaws in Web Applications are caused by absence of the user input validation. But, it is difficult to detect various abnormal user inputs by pattern matching method. In this paper, we propose the Web Application securing proxy based on profiling which can be constructed by learning usual normal activity. The proposed proxy system can detect and filter out attacker’s abnormal requests via anomaly detection mechanism.
Abdulkareem Al-alwani - One of the best experts on this subject based on the ideXlab platform.
-
Systematic review of Web Application security development model
Artificial Intelligence Review, 2015Co-Authors: Bala Musa Shuaibu, Norita Norwawi, Mohd Hasan Selamat, Abdulkareem Al-alwaniAbstract:In recent years, Web security has been viewed in the context of securing the Web Application layer from attacks by unauthorized users. The vulnerabilities existing in the Web Application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security development models used to secure the Web Application layer, the security approaches or techniques used in the process, the stages in the development model in which the approaches or techniques are emphasized, and the tools and mechanism used to detect vulnerabilities. The study extracted 499 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Google-Scholar, Science Direct, Scopus, Springer Link and ISI Web. After investigation, only 43 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one development model is referred to as a standard or preferred model for Web Application development. However, agile development models seem to have gained more attention, probably due to the multiple stakeholders that are involved in discussing security viewpoints, rather than a few members of the development team. It appears also that there is consistency in the use of the threat-modeling technique, probably due to its effectiveness in dealing with different kinds of vulnerabilities.
I Ishida - One of the best experts on this subject based on the ideXlab platform.
-
presentation layer framework of Web Application systems with server side java technology
Computer Software and Applications Conference, 2000Co-Authors: A Saimi, T Syomura, Hiroshi Suganuma, I IshidaAbstract:Demands for Web Application systems with server-side Java technologies force the Application service providers (ASPs) to deliver solutions in a timely manner. There are a number of major concerns, however, for ASPs in developing such systems, including the shortage of Java experts with experience, and the reduction of development time. To cope with these issues, we developed a framework mainly focused on the presentation layer of Web Application systems called PlayFwas. PlayFwas provides: (1) a set of processes for design and implementation with documentation formats; (2) abstract classes for both Java servlet components and JavaBeans components; and (3) a template source code for JSP. A preliminary case study shows that PlayFwas enables less experienced programmers to develop Web Application systems efficiently without sacrificing either maintainability or extensibility. The paper discusses the architecture of PlayFwas and its impact on Web Application development.