Janot et al., 2008 - Google Patents
Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOMJanot et al., 2008
View PDF- Document ID
- 8306025392163261610
- Author
- Janot E
- Zavarsky P
- Publication year
External Links
Snippet
SQL Injection Attacks are a relatively recent threat to the confidentiality, integrity and availability of online applications and their technical infrastructure, accounting for nearly a fourth of web vulnerabilities [1]. In this paper based on a master thesis [2], and numerous …
- 239000007924 injection 0 title abstract description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Alwan et al. | Detection and prevention of SQL injection attack: a survey | |
| Abikoye et al. | A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm | |
| Li et al. | A survey on server-side approaches to securing web applications | |
| Mitropoulos et al. | Defending against web application attacks: Approaches, challenges and implications | |
| Almorsy et al. | Supporting automated vulnerability analysis using formalized vulnerability signatures | |
| Wei et al. | Preventing SQL injection attacks in stored procedures | |
| Singh et al. | xBook: Redesigning Privacy Control in Social Networking Platforms. | |
| Marback et al. | A threat model‐based approach to security testing | |
| Tajpour et al. | SQL injection detection and prevention techniques | |
| Cirnu et al. | Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture | |
| Elshazly et al. | A survey of SQL injection attack detection and prevention | |
| Chaudhary et al. | Securing heterogeneous embedded devices against XSS attack in intelligent IoT system | |
| Zhang et al. | Malicious package detection in npm and pypi using a single model of malicious behavior sequence | |
| Dhariwal et al. | C-Queued Technique against SQL injection attack | |
| Kausar et al. | SQL injection detection and prevention techniques in ASP .NET web application | |
| Gupta et al. | Attacks on web services need to secure XML on web | |
| Naderi-Afooshteh et al. | Joza: Hybrid taint inference for defeating web application sql injection attacks | |
| Gupta et al. | Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions | |
| Hou et al. | Towards analyzing mongodb nosql security and designing injection defense solution | |
| Vijayalakshmi et al. | Case Study: extenuation of XSS attacks through various detecting and defending techniques | |
| Futoransky et al. | A dynamic technique for enhancing the security and privacy of web applications | |
| Dwivedi et al. | A Survey on Security Threats and Mitigation Strategies for NoSQL Databases: MongoDB as a Use Case | |
| Janot et al. | Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOM | |
| Aliero et al. | Classification of Sql Injection Detection And Prevention Measure | |
| Dwivedi et al. | SQLAS: Tool to detect and prevent attacks in php web applications |