Web Application Security using Distributed Encipherment
نویسندگان
چکیده
منابع مشابه
Web Application Encipherment Key Management using Distributed Object Activation
As the internet information technology grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. Quantity of encrypted data that transmitted through network is increasing by development of information and communication technology. We have many problems; it is caused by technical development and service increase of user requests. It is necessary that ...
متن کاملDistributed Object Activation for Web Application Encipherment Key
Quantity of encrypted data that transmitted through internet is increasing continuously by development of communication technology. We have many problems; it is caused by technical development and service increase of user requests. It is necessary that create a many encryption key in one web application system. As a result, service quality comes to be low because of increased network traffic an...
متن کاملWeb Application Security
Web application security is a branch of Information Security that deals specifically with security of websites, web applications and web services. Simply, Web Application Security is ―The securing of web applications‖. Web applications are one of the most prevalent platforms for information and services delivery over Internet today. As they are increasingly used for critical services, web appli...
متن کاملDistributed Contingency Logic and Security
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
متن کاملWeb Application Security Dagstuhl Seminar
From 29th March to 3rd April 2009 the Dagstuhl Seminar 09141 Web Application Security was held in Schloss Dagstuhl Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar are put together in this paper. Links to full papers (if available) ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korea Contents Association
سال: 2008
ISSN: 1598-4877
DOI: 10.5392/jkca.2008.8.4.010