Another Element for Security Improvement Approach in Web Development Application

نویسندگان

  • Rajiv Mahajan
  • Surjit Singh
  • Amarpreet Singh
چکیده

In high-speed and extremely complex environment Web enabled, information Security. In Security Improvement Approach (SIA) understanding security This paper presents basic organizational elements that need to be identified, defined and addressed before examining a Web Engineering Development process for security. These elements are derived from empirical evidence based on a Web survey and supporting literature. This paper contribute Web Engineering specific elements that need to be acknowledged and resolved before examining a Web Engineering process from a security perspective and the elements can also be used in the assessment of a current application development process prior to an SIA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elicitation Strategies for Web Application Using Activity Theory

Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...

متن کامل

Elicitation Strategies for Web Application Using Activity Theory

Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Appreciative Inquiry Approach in Evaluation of Medical Education Programs: Definition and Application

Background: The ultimate goal of educational program evaluation the development of individuals and organizations. Achieving this goal requires evaluation methods with a systematic approach to all components of the program. Methods: In this narrative review study, the keywords "Appreciative Inquiry Approach", Program Evaluation", "Medical Education" were searched in Scopus, Web of Science, EMBA...

متن کامل

Applying Security for RESTful Web Services – Limitations and Delimitations

The Service Oriented Architecture (SOA) becomes an essential element of modern Enterprise Application Integration (EAI). Among the available SOA implementations, Web Services are most preferable choice by the enterprises as they operate on simple Internet protocols. In principle, web services use SOAP protocol as a base for transmitting requests and responses in between service requester and se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010