XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
Web services have become a powerful interface for backend database systems which provides many services such as automatic purchasing, inventory tracking and clinical management. However, along the benefit of Web services, comes a serious risk of security breaches. Most Web services are deployed with...
| Main Authors: | Asmawi, Aziah, Affendey, Lilly Suriani, Udzir, Nur Izura, Mahmod, Ramlan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30654/ http://psasir.upm.edu.my/id/eprint/30654/1/XIPS.pdf |
Similar Items
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006)
by: Affendey, Lilly Suriani
Published: (2006)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
User-independent and self-optimizing intrusion detection framework for large database systems
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
Hybrid query for video database system
by: Affendey, Lilly Suriani, et al.
Published: (2008)
by: Affendey, Lilly Suriani, et al.
Published: (2008)
Content-based image retrieval using transfer learning and vector database
by: Shuo, Li, et al.
Published: (2022)
by: Shuo, Li, et al.
Published: (2022)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
3-L model: a model for checking the integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Hepatitis C transmission and treatment as prevention - The role of the injecting network
by: Hellard, M., et al.
Published: (2015)
by: Hellard, M., et al.
Published: (2015)
A framework for caching relevant data divisions for checking integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A framework for caching relevant data items for checking integrity constraints of mobile database
by: Dzolkhifli, Zarina, et al.
Published: (2008)
by: Dzolkhifli, Zarina, et al.
Published: (2008)
An efficient schema transformation technique for data migration from relational to column-oriented databases
by: Zaidi, Norwini, et al.
Published: (2022)
by: Zaidi, Norwini, et al.
Published: (2022)
A framework for improving integrity constraints checking of mobile databases by caching relevant data items.
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
Preventing HIV/AIDS: Can Web Communication Help?
by: Desai, R., et al.
Published: (2015)
by: Desai, R., et al.
Published: (2015)
Multi criteria route determination model for blind and visually
impaired people in indoor environments: A User centric approach
by: Fernando, Thudugala Mudalige Thushari Nimalika
Published: (2022)
by: Fernando, Thudugala Mudalige Thushari Nimalika
Published: (2022)
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
Adapting web images for blind people
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
Tagging web images for blind users.
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression
by: Mehdi, Osama A., et al.
Published: (2018)
by: Mehdi, Osama A., et al.
Published: (2018)
Avian-centric design
by: Abdul Shukor, Shureen Faris
Published: (2015)
by: Abdul Shukor, Shureen Faris
Published: (2015)
Commentary on Saunders' "The Great Legalization Debate": Preventing AIDS among injecting drug users
by: Loxley, Wendy
Published: (1990)
by: Loxley, Wendy
Published: (1990)
Towards Vulnerability Prevention Model for Web Browser
using Interceptor Approach
by: Nayeem, Khan, et al.
Published: (2015)
by: Nayeem, Khan, et al.
Published: (2015)
F8 a prospective, randomized, double-blinded trial to study the
efficacy of topical tocotrienol in the prevention of hypertrophic
scars
by: Khoo Teng, Lye
by: Khoo Teng, Lye
Missing values estimation for skylines in incomplete database
by: Alwan, Ali, et al.
Published: (2018)
by: Alwan, Ali, et al.
Published: (2018)
Time effect of water injection on the mechanical properties of coal and its application in rockburst prevention in mining
by: Liu, X., et al.
Published: (2017)
by: Liu, X., et al.
Published: (2017)
Governing street-based injecting drug users: A critique of heroin overdose prevention in Australia
by: Moore, David
Published: (2004)
by: Moore, David
Published: (2004)
Harm reduction workers and the challenge of engaging couples who inject drugs in hepatitis C prevention.
by: Treloar, C., et al.
Published: (2016)
by: Treloar, C., et al.
Published: (2016)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
Processing skyline queries in incomplete distributed databases
by: Alwan, Ali Amer, et al.
Published: (2016)
by: Alwan, Ali Amer, et al.
Published: (2016)
Processing skyline queries in incomplete distributed databases
by: Alwan, Ali Amer, et al.
Published: (2016)
by: Alwan, Ali Amer, et al.
Published: (2016)
Estimating missing values of skylines in incomplete database
by: Alwan, Ali A., et al.
Published: (2013)
by: Alwan, Ali A., et al.
Published: (2013)
Preference evaluation techniques of preference queries in database
by: Alwan, Ali A., et al.
Published: (2013)
by: Alwan, Ali A., et al.
Published: (2013)
Skyline queries over incomplete multidimensional database
by: Alwan, Ali Amer, et al.
Published: (2011)
by: Alwan, Ali Amer, et al.
Published: (2011)
Preventative health: Science and technology in the prevention and early detection of disease
by: Daube, Mike
Published: (2008)
by: Daube, Mike
Published: (2008)
Hybrid query for video database system
by: Affendey, Lilly Suriani, et al.
Published: (2008)
by: Affendey, Lilly Suriani, et al.
Published: (2008)
Similar Items
-
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012) -
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016) -
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011) -
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006)