Protecting AJAX Code Using Secure Communication

نویسندگان

  • Rami Al-Salman
  • Mohammad Fraiwan
  • Natheer Khasawneh
چکیده

AJAX is a ubiquitous technology that empowers Web applications by facilitating communication with the server side of the Web transaction. The drawback of this enabling technology is that malicious exploits can use this AJAX “back door” to communicate on behalf the client/server and steal users’ information. In this paper, we present a technique that will protect the AJAX-enabled communication. The method works by encrypting the URL and content using the low overhead Tiny Encryption Algorithm. Authentication of the content is done via 3rd party verification of the encrypted URL and content, and the SHA-1 digital signature of the user.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposal and Implementation of SSH Client System Using Ajax

Technology called Ajax gives web applications the functionality and operability of desktop applications. In this study, we propose and implement a Secure Shell (SSH) client system using Ajax, independent of the OS or Java execution environment. In this system, SSH packets are generated on a web browser by using JavaScript and a web server works as a proxy in communication with an SSH server to ...

متن کامل

Subverting Ajax for Fun and Profit

The ability of modern browsers to use asynchronous requests introduces a new type of attack vectors. In particular, an attacker can inject client side code to totally subvert the communication flow between client and server. In fact, advanced features of Ajax framework build up a new transparent layer not controlled by the user. This paper will focus on security aspects of Ajax technology and o...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent

Mobile agent plays an important role in developing applications of open, distributed and mixed environments, such as the internet. Mobile agent or mobile software agent is piece of software that can operate autonomously to accomplish user assigned task. To explain more, mobile agent is the process which can migrate to hosts autonomously. As an agent travels to do execution in different environm...

متن کامل

Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol

being developed using Scripting languages. PHP (ver. 5) and MySQL along with AJAX have been used extensively. Abstract:-Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friend...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011