Web application security engineering

被引:16
|
作者
Meier, J. D. [1 ]
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
关键词
D O I
10.1109/MSP.2006.109
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The review of the steps involved in applying security-specific activities throughout the software development life cycle, is presented. The real weakness in the bolt-on approach, based on the concept that "make it work, and then make it right" is that some of the more important design decisions that impact an applications security have a cascading effect on the rest of applications design. The review suggested that objectives, threat modeling, design guidelines, architecture and design review, code review, and testing are the base line activities for security engineering. Performing a preliminary scan using static analysis, reviewing code for security issues and finding security vulnerability, and reviewing for security issues unique to users system architecture can be the tools for identifying security code review objectives. An application may behave different during development and production as the developers are unknown to the infrastructure constraints.
引用
收藏
页码:16 / 24
页数:9
相关论文
共 50 条
  • [1] Web development evolution: The assimilation of Web Engineering security
    Glisson, WB
    Welland, R
    Third Latin American Web Congress, Proceedings, 2005, : 49 - 53
  • [2] Web engineering security: Essential elements
    Glisson, William Bradley
    Welland, Ray
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 707 - +
  • [3] Web Engineering Security (WES) Methodology
    Glisson, William Bradley
    Welland, Ray
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 34 : 1359 - 1396
  • [4] A Review on Application Security Management Using Web Application Security Standards
    Phanindra, A. Rakesh
    Narasimha, V. B.
    PhaniKrishna, Ch, V
    SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 477 - 486
  • [5] Security Requirements Engineering Process for Web Applications
    Salini, P.
    Kanmani, S.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2799 - 2807
  • [6] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [7] Web application security assessment tools
    Curphey, Mark
    Araujo, Rudolph
    IEEE SECURITY & PRIVACY, 2006, 4 (04) : 32 - 41
  • [8] Open Web Application Security Project
    Dirk Fox
    Datenschutz und Datensicherheit - DuD, 2006, 30 (10) : 636 - 636
  • [9] Web Application Security: A Pragmatic Expose
    Aladi, Clement C.
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (02):
  • [10] A Novice Approach for Web Application Security
    Doshi, Jignesh
    Trivedi, Bhushan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 1 - 9