A STUDY OF SECURITY ISSUES IN WEB SYSTEMS
Ключевые слова:
security, web services, distributed computing, link applications.Аннотация
Web Services are a promising solution to an age-old need: fast and flexible information sharing among people and businesses. They represent the next phase of distributed computing, building on the shoulders of the previous distributed models. Web Services leverage the ubiquity of the Internet to link applications, systems, and resources within and among enterprises to enable exciting, new business processes and relationships with customers, partners, and suppliers around the world. Web Services are a promising solution to an age-old need: fast and flexible information sharing among people and businesses. They represent the next phase of distributed computing, building on the shoulders of the previous distributed models. Web Services leverage the ubiquity of the Internet to link applications, systems, and resources within and among enterprises to enable exciting, new business processes and relationships with customers, partners, and suppliers around the world. They enable access to data that has previously been locked within corporate networks and accessible only by using specialized software. Along with the benefits of Web Services comes a serious risk: sensitive and private data can be exposed to people who are not supposed to see it.
Библиографические ссылки
Cheswick, W, Bellovin, S & Rubin, A 2003, Firewalls and Internet security: repelling the wily hacker, Addison-Wesley Longman Publishing Co., Inc., Chicago, Illinois.
Curphey, M & Arawo, R 2006, ‘Web application security assessment tools’, Security & Privacy, IEEE, vol. 4, no. 4, pp. 32-41.
Huang, Y, Huang, S, Lin, T & Tsai, C 2003, ‘Web application security assessment by fault injection and behavior monitoring’, In Proceedings of the 12th International Conference on World Wide Web, vol. 17, no. 9, pp. 148-159.
Joshi, J, Aref, W, Ghafoor, A & Spafford, E 2001, ‘Security models for web-based applications’, Communications of the ACM, vol. 44, no. 2, pp. 38-44.
Pfleeger, C & Pfleeger, S 2007, Security in computing. Prentice Hall, Upper Saddle River, NJ.
Stuttard, D & Pinto, M 2008, The web application hacker’s handbook: discovering and exploiting security flaws, John Wiley & Sons, Hoboken, NJ.