메뉴 건너뛰기




Volumn , Issue , 2007, Pages 861-866

A solution to block cross site scripting vulnerabilities based on service oriented architecture

Author keywords

Application level web security; Cross site scripting; Security vulnerabilities

Indexed keywords

APPLICATION SERVERS; APPLIED (CO); CROSS SITE SCRIPTING; CROSS-SITE SCRIPTING (XSS); INTERNATIONAL (CO); INTERNATIONAL CONFERENCES; LANGUAGES (TRADITIONAL); OTHER INTERFACES; RESEARCH DATA; SERVICE ORIENTED ARCHITECTURE (SOA); WEB APPLICATIONS; WEB PAGES;

EID: 46749142572     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIS.2007.45     Document Type: Conference Paper
Times cited : (18)

References (14)
  • 1
    • 77953069969 scopus 로고    scopus 로고
    • Scott, D., Sharp, R. Abstracting Application-Level Web Security. In: Proc. 11th Int'l Conf. World Wide Web (WWW2002), pages 396-407, Honolulu, Hawaii, May 17-22, 2002. -8
    • Scott, D., Sharp, R. "Abstracting Application-Level Web Security." In: Proc. 11th Int'l Conf. World Wide Web (WWW2002), pages 396-407, Honolulu, Hawaii, May 17-22, 2002. -8
  • 2
    • 0036870155 scopus 로고    scopus 로고
    • Developing Secure Web Applications
    • 9, Nov
    • Scott, D., Sharp, R. "Developing Secure Web Applications." IEEE Internet Computing, 6(6), 38-45, Nov 2002. -9
    • (2002) IEEE Internet Computing , vol.6 , Issue.6 , pp. 38-45
    • Scott, D.1    Sharp, R.2
  • 3
    • 16244394407 scopus 로고    scopus 로고
    • Bulletproof Web Security
    • TechTarget Storage Media, May 2002, last accessed Dec 10, 2006
    • Bobbitt, M. "Bulletproof Web Security." Network Security Magazine, TechTarget Storage Media, May 2002., http://infosecuritymag. techtarget.com/2002/may/bulletproof.shtml , last accessed Dec 10, 2006
    • Network Security Magazine
    • Bobbitt, M.1
  • 4
    • 33751032654 scopus 로고    scopus 로고
    • Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks
    • In The , Pages:, April 23-27
    • Engin Kirda, Christopher Kruegel, Giovanni Vigna, and Nenad Jovanovic "Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks" In The 21 st ACM Symposium on Applied Computing (SAC 2006), Pages: 330-337 , April 23-27, 2006.
    • (2006) 21 st ACM Symposium on Applied Computing (SAC , pp. 330-337
    • Kirda, E.1    Kruegel, C.2    Vigna, G.3    Jovanovic, N.4
  • 5
    • 46749147844 scopus 로고    scopus 로고
    • O.Ismaill.M.E.Youki.K.adobayashi, S.Yamaguch, A proposal and Implementation of Automatic Detection/Collection system for Cross-Site Scripting Vulnerability Proceeding of the 18 Internation conference on Advanced Information Networking and Application (AINA'04).
    • O.Ismaill.M.E.Youki.K.adobayashi, S.Yamaguch, " A proposal and Implementation of Automatic Detection/Collection system for Cross-Site Scripting Vulnerability" Proceeding of the 18 Internation conference on Advanced Information Networking and Application (AINA'04).
  • 6
    • 46749141556 scopus 로고    scopus 로고
    • CERT® Advisory CA-2000-02, Malicious HTML Tags Embedded in Client Web Requests, http://www.cert.org/advisories/CA-2000-02.html, last accessed Dec 10, 2006
    • CERT® Advisory CA-2000-02, "Malicious HTML Tags Embedded in Client Web Requests", http://www.cert.org/advisories/CA-2000-02.html, last accessed Dec 10, 2006
  • 7
    • 46749153690 scopus 로고    scopus 로고
    • Less than zero-day' threats too often overlooked, analysts warn Companies tend to focus only on patching known flaws, ignoring other threats
    • October 26
    • Jaikumar Vijayan, '"Less than zero-day' threats too often overlooked, analysts warn Companies tend to focus only on patching known flaws, ignoring other threats",Computerworld, October 26, 2006
    • (2006) Computerworld
    • Vijayan, J.1
  • 8
    • 46749151245 scopus 로고    scopus 로고
    • John McCormick, Microsoft users face two zero-day threats in a week, article available at http://articles.techrepublic.com.eom/5100- 1009_11-6132973.html, 11/6/06
    • John McCormick, "Microsoft users face two zero-day threats in a week", article available at http://articles.techrepublic.com.eom/5100- 1009_11-6132973.html, 11/6/06
  • 9
    • 19944365247 scopus 로고    scopus 로고
    • Securing web application code by static analysis and runtime protection
    • New York, USA, Pages:, May 17-22
    • Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo, " Securing web application code by static analysis and runtime protection",. In Proceedings of International WWW Conference, New York, USA, 2004, Pages: 40-52, May 17-22, 2004.
    • (2004) Proceedings of International WWW Conference , pp. 40-52
    • Huang, Y.-W.1    Yu, F.2    Hang, C.3    Tsai, C.-H.4    Lee, D.-T.5    Kuo, S.-Y.6
  • 11
    • 46749134651 scopus 로고    scopus 로고
    • Beirut, Lebanon, Andy Podgurski Case Western Reserve University, Cleveland, OH , "Using dynamic information flow analysis to detect attacks against applications
    • Wes Masri American University of Beirut, July
    • Wes Masri American University of Beirut, Beirut, Lebanon, Andy Podgurski Case Western Reserve University, Cleveland, OH , "Using dynamic information flow analysis to detect attacks against applications", ACM SIGSOFT Software Engineering Notes Volume 30, Issue 4 July 2005
    • (2005) ACM SIGSOFT Software Engineering Notes , vol.30 , Issue.4
  • 13
    • 16244362392 scopus 로고    scopus 로고
    • Wes Masri, Andy Podgurski, David Leon, Detecting and Debugging Insecure Information Flows, issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
    • Wes Masri, Andy Podgurski, David Leon, "Detecting and Debugging Insecure Information Flows," issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
  • 14
    • 46749116266 scopus 로고    scopus 로고
    • WebCohort's Application Defense Center Reports Results of Vulnerability Testing on Web Applications Only 10% of Web Applications Are Secured Against Common Hacking Techniques, February, 02, 2004, , last accessed Feb 12th, 2006.
    • WebCohort's Application Defense Center Reports Results of Vulnerability Testing on Web Applications "Only 10% of Web Applications Are Secured Against Common Hacking Techniques", February, 02, 2004, ), last accessed Feb 12th, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.