Hyatt, 2009 - Google Patents
Web 2.0 injection infection vulnerability classHyatt, 2009
- Document ID
- 11644244647597959647
- Author
- Hyatt D
- Publication year
- Publication venue
- Information Security Journal: A Global Perspective
External Links
Snippet
Web 2.0 defines a changing trend in the use of World Wide Web application development and web design technology. Web 2.0 design concepts have led to the evolution of a web culture that has allowed social-networking and ease of design use of non-secure component …
- 239000007924 injection 0 title abstract description 66
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10164993B2 (en) | Distributed split browser content inspection and analysis | |
Kirda et al. | Client-side cross-site scripting protection | |
Mirheidari et al. | Cached and confused: Web cache deception in the wild | |
Bhardwaj et al. | Privacy-aware detection framework to mitigate new-age phishing attacks | |
Saqib et al. | Reviewing risks and vulnerabilities in web 2.0 for matching security considerations in web 3.0 | |
Nagunwa | Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors | |
Fraiwan et al. | Analysis and identification of malicious javascript code | |
Pellegrino et al. | Uses and abuses of server-side requests | |
Muscat | Web vulnerabilities: identifying patterns and remedies | |
Sharif | Web attacks analysis and mitigation techniques | |
Nakhaei et al. | JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures | |
Chaudhari et al. | A survey on security and vulnerabilities of web application | |
Süren et al. | Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits. | |
Santos | CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide | |
Prasad | Mastering modern Web penetration testing | |
Ofuonye et al. | Securing web-clients with instrumented code and dynamic runtime monitoring | |
Al-Khannak et al. | Penetration Testing for the cloud-based web application | |
Shahriar et al. | Towards an attack signature generation framework for intrusion detection systems | |
Fryer et al. | Malicious web pages: What if hosting providers could actually do something… | |
Kaur et al. | Cross-site-scripting attacks and their prevention during development | |
Ninawe et al. | Detection of DOM-based XSS attack on web application | |
Maleh | Web application PenTesting: A comprehensive Guide for professionals | |
Mun et al. | Secure short url generation method that recognizes risk of target url | |
Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
Sanjana et al. | A study on cross site scripting attacks |