期刊文献+
共找到360篇文章
< 1 2 18 >
每页显示 20 50 100
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities 被引量:6
1
作者 Juan R.Bermejo Higuera Javier Bermejo Higuera +2 位作者 Juan A.Sicilia Montalvo Javier Cubo Villalba Juan JoséNombela Pérez 《Computers, Materials & Continua》 SCIE EI 2020年第9期1555-1577,共23页
To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities ... To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities as possible.To compare static analysis tools for web applications,an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project(OWASP)Top Ten project is required.The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance.Given the significant cost of commercial tools,this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project.Thus,the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project.The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality. 展开更多
关键词 web application benchmark security vulnerability security Analysis Static Tools assessment methodology false positive false negative precision F-MEASURE
在线阅读 下载PDF
ASP.NET开发环境下Web系统安全解决方案的实现 被引量:11
2
作者 苏彦君 朱仲颖 《实验室研究与探索》 CAS 北大核心 2009年第3期59-61,共3页
针对大多数的Web安全问题涉及到客户/服务器的交互,从.NET站点建立入手,通过分析用户访问配置、系统代码安全、系统数据交互模式及数据库的安全问题,研究Web系统存在安全隐患,并提出解决方案。
关键词 asp.net web应用 因特网信息服务组件
在线阅读 下载PDF
基于ASP.NET技术的Web应用系统安全机制分析与设计 被引量:18
3
作者 赵争 《计算机科学》 CSCD 北大核心 2008年第2期104-106,共3页
本文重点探讨基于ASP.NET技术开发Web应用系统的安全问题。分析了用ASP.NET技术开发Web应用系统易产生的安全隐患,对操作系统、开发平台和数据库之间的安全协作机制进行了分析,并重点讨论了数据库资源的保护问题,最后以一个文档管理系... 本文重点探讨基于ASP.NET技术开发Web应用系统的安全问题。分析了用ASP.NET技术开发Web应用系统易产生的安全隐患,对操作系统、开发平台和数据库之间的安全协作机制进行了分析,并重点讨论了数据库资源的保护问题,最后以一个文档管理系统为例,具体说明了如何实现对数据库资源的安全访问。 展开更多
关键词 asp.net web应用系统 安全 数据库 文档管理系统
在线阅读 下载PDF
基于ASP.NET的Web应用程序安全性的探讨 被引量:2
4
作者 刘翼 叶倩 刘描 《电子设计工程》 2009年第2期92-94,共3页
目前网站的绝大部分资源对浏览者是开放的,但有些信息是特别针对某些用户的,只有特定权限的用户才能访问,因此,Web应用程序安全性便是热点研究问题。介绍了基于ASP.NET的Web应用程序安全性的验证、授权和模拟等处理程序的实现技术与方法。
关键词 asp.net web应用程序 安全性 权限 验证模式
在线阅读 下载PDF
Web应用程序由ASP向ASP.NET迁移的策略与方法 被引量:1
5
作者 许建林 石永革 《计算机与现代化》 2005年第5期47-50,共4页
基于实践,介绍了在将Web应用程序由ASP向ASP.NET迁移的过程中,可能遇到的问题及相应的策略与方法。
关键词 asp asp.net web应用程序 迁移
在线阅读 下载PDF
基于B/S结构和ASP.NET技术的Web应用研究及实现 被引量:7
6
作者 王晓鹏 《贵州工业大学学报(自然科学版)》 CAS 2005年第4期59-62,共4页
首先对ASP.NET技术的特点进行分析,然后对基于B/S结构和ASP.net技术的Web应用程序开发过程进行了探讨,最后给出了一个网络考试系统应用实例。
关键词 asp.net B/S结构 web应用 网络考试系统
在线阅读 下载PDF
ASP.NET开发环境下的Web系统的安全解决方案研究 被引量:6
7
作者 苏彦君 朱仲颖 《计算机与数字工程》 2009年第1期105-108,共4页
阐述了Web系统的安全现状,从ASP.NET技术出发,分析其安全隐患,设计了运用于实际的针对IIS、身份验证、数据传输和数据库访问等安全问题的解决方案。
关键词 asp.net web应用解决方案
在线阅读 下载PDF
基于ASP.NET MVC框架的Web设计 被引量:15
8
作者 叶红卫 《河北北方学院学报(自然科学版)》 2009年第6期61-65,共5页
描述了ASP.NET MVC框架和ASP.NET MVC Web应用程序的目录结构,并设计实现一个图书信息在线管理Web应用程序,展示了在ASP.NET MVC框架下Web应用程序的设计与实现.
关键词 net MVC asp net web应用程序
在线阅读 下载PDF
基于ASP.NET下XML Web Services安全机制的研究 被引量:1
9
作者 黄政 《嘉兴学院学报》 2006年第3期88-91,共4页
介绍了通过ASP.NET配置和程序实现XML Web services安全的方法,从而确保访问Web服务的安全性。
关键词 asp.net XML web SERVICES 安全 身份验证
在线阅读 下载PDF
基于ASP.NET构建安全的Web应用程序 被引量:1
10
作者 常婉纶 刘辉 《西安文理学院学报(自然科学版)》 2010年第3期57-60,共4页
基于B/S模式的应用系统存在的用户帐号泄漏、未授权页面的访问、浏览器自动填充文本框、Web.config文件对站点配置信息暴露等安全隐患,针对各种安全漏洞,从信息加密、脚本程序实现对浏览器功能控制、Session认证等几方面进行探讨,以有... 基于B/S模式的应用系统存在的用户帐号泄漏、未授权页面的访问、浏览器自动填充文本框、Web.config文件对站点配置信息暴露等安全隐患,针对各种安全漏洞,从信息加密、脚本程序实现对浏览器功能控制、Session认证等几方面进行探讨,以有效提高系统安全性能. 展开更多
关键词 web应用程序 安全隐患 加密
在线阅读 下载PDF
ASP.NET2.0环境下Web应用程序的部署 被引量:1
11
作者 肖昆明 《电脑与信息技术》 2012年第4期46-48,共3页
一个完整的ASP.NET应用程序除了若干Web页面文件外,还包括与之相关的配置文件及其他文件。这些文件需要进行很好的配置,才能保证整个Web应用程序在Internet上的安全发布和有效运行。文章主要介绍了Web应用程序部署与配置的基本概念、We... 一个完整的ASP.NET应用程序除了若干Web页面文件外,还包括与之相关的配置文件及其他文件。这些文件需要进行很好的配置,才能保证整个Web应用程序在Internet上的安全发布和有效运行。文章主要介绍了Web应用程序部署与配置的基本概念、Web站点的创建、Web站点的安全性设置、重点讲述了web.config文件和global.asax文件的配置,并突出了安全访问控制的思想和具体实现方法。 展开更多
关键词 Aasp.net web应用程序部署 web.CONFIG global.aspx 安全性
在线阅读 下载PDF
基于UML的ASP.NETWeb应用程序设计
12
作者 赖步英 《微型电脑应用》 2005年第5期36-39,66,共4页
随着Internet应用的不断发展,ASP.NET技术正在逐步取代ASP技术,而成为开发Internet(Web)应用程序的首选产品。Web应用程序通常由大量网页构成,ASP.NET也不例外,因此,如何有效地进行Web应用程序的设计与开发,是非常值得研究的问题。基于... 随着Internet应用的不断发展,ASP.NET技术正在逐步取代ASP技术,而成为开发Internet(Web)应用程序的首选产品。Web应用程序通常由大量网页构成,ASP.NET也不例外,因此,如何有效地进行Web应用程序的设计与开发,是非常值得研究的问题。基于目前较为成熟的UML建模语言,针对Web应用程序的特点,本文对ASP.NET应用程序设计的若干问题进行了研究。 展开更多
关键词 应用程序设计 UML web应用程序 asp.net技术 Internet asp技术 设计与开发 建模语言 若干问题 网页
在线阅读 下载PDF
新一代动态Web应用开发技术——ASP.NET 被引量:1
13
作者 蔡凌宏 蔡凌卿 《现代计算机》 2003年第6期14-17,21,共5页
本文在对各种已有Web应用开发技术研究的基础之上,介绍了微软在其NET架构中推出的新一代的动态Web应用开发技术——ASP.NET,并通过与ASP进行对比,阐明了ASP.NET的特点,此外还给出了ASP.NET的应用实例。
关键词 动态网页 asp.net 互联网 web 应用程序 ACTIVEX组件
在线阅读 下载PDF
Systematic Review of Web Application Security Vulnerabilities Detection Methods 被引量:2
14
作者 Sajjad Rafique Mamoona Humayun +2 位作者 Zartasha Gul Ansar Abbas Hasan Javed 《Journal of Computer and Communications》 2015年第9期28-40,共13页
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed eit... In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security vulnerabilities used to secure the web application layer, the security approaches or techniques used in the process, the stages in the software development in which the approaches or techniques are emphasized, and the tools and mechanisms used to detect vulnerabilities. The study extracted 519 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Science Direct, Springer Link. After detailed review process, only 56 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one software is referred to as a standard or preferred software product for web application development. In our SLR, we have performed a deep analysis on web application security vulnerabilities detection methods which help us to identify the scope of SLR for comprehensively investigation in the future research. Further in this SLR considering OWASP Top 10 web application vulnerabilities discovered in 2012, we will attempt to categories the accessible vulnerabilities. OWASP is major source to construct and validate web security processes and standards. 展开更多
关键词 SOFTWARE Development LIFECYCLE web applications security VULNERABILITIES Systematic LITERATURE REVIEW
在线阅读 下载PDF
Hybrid Security Assessment Methodology for Web Applications 被引量:1
15
作者 Roddy A.Correa Juan Ramon Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio SiciliaMontalvo Manuel Sanchez Rubio A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期89-124,共36页
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment... This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks. 展开更多
关键词 web applications security vulnerability WEAKNESS security analysis white box black box interactive application security testing static application security testing dynamic application security testing
在线阅读 下载PDF
Hybrid Computational Modeling for Web Application Security Assessment 被引量:1
16
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第1期469-489,共21页
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the so... Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 展开更多
关键词 Healthcare web application security assessment hesitant fuzzy sets AHP-TOPSIS
在线阅读 下载PDF
基于ASP.NET窗体身份验证构建安全的Web应用程序 被引量:1
17
作者 吴观福 《电脑学习》 2008年第3期48-49,共2页
提出一种利用密码哈希值和随机数实现窗体身份验证的改进方法,并给出实现的C#程序代码。
关键词 asp.net 窗体身份验证 web应用程序 网络安全
在线阅读 下载PDF
基于ASP.NET的移动Web应用探究
18
作者 丁慧 《煤炭技术》 CAS 北大核心 2012年第11期262-264,共3页
移动手机上网被运用的越来越广泛,在这种情况下,移动Web应用的探究,具有非常重要的意义和作用。本文首先介绍了几种不同的查询移动Web的方式,并介绍ASP.NET移动控件添加到ASP.NET Web窗体的扩展方面的内容。此外,还以某高校的成绩查询... 移动手机上网被运用的越来越广泛,在这种情况下,移动Web应用的探究,具有非常重要的意义和作用。本文首先介绍了几种不同的查询移动Web的方式,并介绍ASP.NET移动控件添加到ASP.NET Web窗体的扩展方面的内容。此外,还以某高校的成绩查询系统为案例,进行系统的建模和设计,详细地分析了ASP.NET技术在移动Web中的应用。 展开更多
关键词 asp.net 移动控件 web应用程序
原文传递
应用ASP.NET构建安全的医学Web应用程序
19
作者 唐秀坤 赵东升 《北京生物医学工程》 2010年第2期177-180,共4页
随着Internet的飞速发展,越来越多的用户利用web获取、发布医学信息。用ASP.NET构建医学Web应用程序为结构设计人员、设计人员和开发人员提出了一系列复杂的安全问题。本文讨论的医学Web应用程序设计方法中,包括管理用户、验证和授权用... 随着Internet的飞速发展,越来越多的用户利用web获取、发布医学信息。用ASP.NET构建医学Web应用程序为结构设计人员、设计人员和开发人员提出了一系列复杂的安全问题。本文讨论的医学Web应用程序设计方法中,包括管理用户、验证和授权用户、加密私有数据和过滤用户输入等。这些方法有效地堵塞各种安全漏洞,建立牢固的医学Web应用程序。 展开更多
关键词 医学web应用程序 安全设计
暂未订购
Secure Development Methodology for Full Stack Web Applications:Proof of the Methodology Applied to Vue.js,Spring Boot and MySQL
20
作者 Kevin Santiago Rey Rodriguez Julián David Avellaneda Galindo +3 位作者 Josep Tárrega Juan Juan Ramón Bermejo Higuera Javier Bermejo Higuera Juan Antonio Sicilia Montalvo 《Computers, Materials & Continua》 2025年第10期1807-1858,共52页
In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementi... In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js,Spring Boot,and MySQL architecture.The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication,fine-grained authorization controls,sophisticated session management,data confidentiality and integrity protection,secure logging mechanisms,comprehensive error handling,high availability strategies,advanced input validation,and security headers implementation.Significant contributions are made to the field of web application security.First,a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats,backed by rigorous analysis and industry best practices.Second,the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment,demonstrating the practical effectiveness of the security measures.The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection,ensuring robust security coverage.The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology.A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle(SSDLC),creating a security-first mindset from initial design to deployment.By combining proactive secure coding practices with defensive security approaches,a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams.This hybrid approach ensures that security considerations are woven into every aspect of the development process,rather than being treated as an afterthought. 展开更多
关键词 web security methodology secure software development lifecycle DevSecOps security requirements secure development Full Stack web applications
在线阅读 下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部