[go: up one dir, main page]

Module et al., 2003 - Google Patents

Guidelines for Securing Apache Web Servers

Module et al., 2003

Document ID
5091728846946218904
Author
Module C
Module E
Publication year
Publication venue
Netw. Secur

External Links

Snippet

Introduction The Apache Web server is currently the most frequently deployed Web server. After hearing about all the problems with Microsoft's Internet Information Server (IIS), you may assume that Apache must be considerably easier to secure. This assumption is to some …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Jackson et al. Subspace: secure cross-domain communication for web mashups
US8353036B2 (en) Method and system for protecting cross-domain interaction of a web application on an unmodified browser
Kirda et al. Noxes: a client-side solution for mitigating cross-site scripting attacks
US8561182B2 (en) Health-based access to network resources
US8806581B2 (en) Secure launching of browser from privileged process
US20110289546A1 (en) Method and apparatus for protecting markup language document against cross-site scripting attack
Lee et al. Identifying Cross-origin Resource Status Using Application Cache.
US7624440B2 (en) Systems and methods for securely providing and/or accessing information
US8650391B2 (en) Systems and methods for securely providing and/or accessing information
Anupam et al. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies.
US8782797B2 (en) Lockbox for mitigating same origin policy failures
La Lau Web Server Part 1: Apache/Nginx Basics
Module et al. Guidelines for Securing Apache Web Servers
Lincke Understanding software threats and vulnerabilities
Lanson Single-use servers: A generalized design for eliminating the confused deputy problem in networked services
US8640244B2 (en) Declared origin policy
Hossain et al. The pros and cons of modern web application security flaws and possible solutions
Petrosyan et al. Development and Implementation of Some Advanced Web Server Protection Methods
Maj Securing Apache 2: Step-by-Step
Heckathorn Network monitoring for web-based threats
Lepofsky Web Application Vulnerabilities and Countermeasures
Aung et al. Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications
Galindo Quintana Understanding malware behaviour through traffic analysis
Ćosić Web 2.0 services (vulnerability, threats and protection measures)
Kritikos A practical approach for web application security