Dual Security Testing Model for Web Applications
نویسندگان
چکیده
منابع مشابه
Dual Security Testing Model for Web Applications
In recent years, web applications have evolved from small websites into large multi-tiered applications. The quality of web applications depends on the richness of contents, well structured navigation and most importantly its security. Web application testing is a new field of research so as to ensure the consistency and quality of web applications. In the last ten years there have been differe...
متن کاملAn Object-Oriented Web Test Model for Testing Web Applications
In recent years, Web applications have grown rapidly As Web applications become complex, there is a growing concern about their quality and reliability. In this paper, we present a methodology that uses an Object-Oriented Web Est Model (WTM) to support Web application testing. The test model captures both structural and behavioral test artifacts of Web applications and represents the artgacts f...
متن کاملModel-based Testing of Web Applications
.......................................................................................................................................................... 1 ACKNOWLEDGMENTS ..................................................................................................................................... 2
متن کاملModel Based Testing in Web Applications
Web applications have become an important aspect of life. It is used to support many activities like online information sharing, for business transactions and many other related things. Due to their high usage, they require high performance to be guaranteed. Therefore more emphasis should be done while testing web based applications. For this, model based testing has been introduced to find err...
متن کاملSecurity Testing of Web Applications: Issues and Challenges
Due to the increasing complexity of web systems, security testing has become indispensable and critical activity of web application development life cycle. Security testing aims to maintain the confidentiality of the data, to check against any information leakage and to maintain the functionality as intended. It checks whether the security requirements are fulfilled by the web applications when...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2016
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2016.070225