Module et al., 2003 - Google Patents
Guidelines for Securing Apache Web ServersModule et al., 2003
- Document ID
- 5091728846946218904
- Author
- Module C
- Module E
- Publication year
- Publication venue
- Netw. Secur
External Links
Snippet
Introduction The Apache Web server is currently the most frequently deployed Web server. After hearing about all the problems with Microsoft's Internet Information Server (IIS), you may assume that Apache must be considerably easier to secure. This assumption is to some …
- 238000000034 method 0 description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jackson et al. | Subspace: secure cross-domain communication for web mashups | |
US8353036B2 (en) | Method and system for protecting cross-domain interaction of a web application on an unmodified browser | |
Kirda et al. | Noxes: a client-side solution for mitigating cross-site scripting attacks | |
US8561182B2 (en) | Health-based access to network resources | |
US8806581B2 (en) | Secure launching of browser from privileged process | |
US20110289546A1 (en) | Method and apparatus for protecting markup language document against cross-site scripting attack | |
Lee et al. | Identifying Cross-origin Resource Status Using Application Cache. | |
US7624440B2 (en) | Systems and methods for securely providing and/or accessing information | |
US8650391B2 (en) | Systems and methods for securely providing and/or accessing information | |
Anupam et al. | Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. | |
US8782797B2 (en) | Lockbox for mitigating same origin policy failures | |
La Lau | Web Server Part 1: Apache/Nginx Basics | |
Module et al. | Guidelines for Securing Apache Web Servers | |
Lincke | Understanding software threats and vulnerabilities | |
Lanson | Single-use servers: A generalized design for eliminating the confused deputy problem in networked services | |
US8640244B2 (en) | Declared origin policy | |
Hossain et al. | The pros and cons of modern web application security flaws and possible solutions | |
Petrosyan et al. | Development and Implementation of Some Advanced Web Server Protection Methods | |
Maj | Securing Apache 2: Step-by-Step | |
Heckathorn | Network monitoring for web-based threats | |
Lepofsky | Web Application Vulnerabilities and Countermeasures | |
Aung et al. | Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications | |
Galindo Quintana | Understanding malware behaviour through traffic analysis | |
Ćosić | Web 2.0 services (vulnerability, threats and protection measures) | |
Kritikos | A practical approach for web application security |