[go: up one dir, main page]

Hyatt, 2009 - Google Patents

Web 2.0 injection infection vulnerability class

Hyatt, 2009

Document ID
11644244647597959647
Author
Hyatt D
Publication year
Publication venue
Information Security Journal: A Global Perspective

External Links

Snippet

Web 2.0 defines a changing trend in the use of World Wide Web application development and web design technology. Web 2.0 design concepts have led to the evolution of a web culture that has allowed social-networking and ease of design use of non-secure component …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Similar Documents

Publication Publication Date Title
US10164993B2 (en) Distributed split browser content inspection and analysis
Kirda et al. Client-side cross-site scripting protection
Mirheidari et al. Cached and confused: Web cache deception in the wild
Bhardwaj et al. Privacy-aware detection framework to mitigate new-age phishing attacks
Saqib et al. Reviewing risks and vulnerabilities in web 2.0 for matching security considerations in web 3.0
Nagunwa Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors
Fraiwan et al. Analysis and identification of malicious javascript code
Pellegrino et al. Uses and abuses of server-side requests
Muscat Web vulnerabilities: identifying patterns and remedies
Sharif Web attacks analysis and mitigation techniques
Nakhaei et al. JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures
Chaudhari et al. A survey on security and vulnerabilities of web application
Süren et al. Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits.
Santos CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
Prasad Mastering modern Web penetration testing
Ofuonye et al. Securing web-clients with instrumented code and dynamic runtime monitoring
Al-Khannak et al. Penetration Testing for the cloud-based web application
Shahriar et al. Towards an attack signature generation framework for intrusion detection systems
Fryer et al. Malicious web pages: What if hosting providers could actually do something…
Kaur et al. Cross-site-scripting attacks and their prevention during development
Ninawe et al. Detection of DOM-based XSS attack on web application
Maleh Web application PenTesting: A comprehensive Guide for professionals
Mun et al. Secure short url generation method that recognizes risk of target url
Kothawade et al. Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment.
Sanjana et al. A study on cross site scripting attacks