Model-based system architecture for preventing XPath injection in database-centric web services environment
Web services have become a powerful interface for back-end database systems. It is a self-describing component that can be used by other applications in a platform-independent manner. However, along the benefit of Web services, comes a serious risk of security breaches. Most web services are deploye...
| Main Authors: | Asmawi, Aziah, Affendey, Lilly Suriani, Udzir, Nur Izura, Mahmod, Ramlan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47685/ http://psasir.upm.edu.my/id/eprint/47685/2/Model-based%20system%20architecture%20for%20preventing%20XPath%20injection%20in%20database-centric%20web%20services%20environment.pdf |
Similar Items
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006)
by: Affendey, Lilly Suriani
Published: (2006)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
User-independent and self-optimizing intrusion detection framework for large database systems
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Hybrid query for video database system
by: Affendey, Lilly Suriani, et al.
Published: (2008)
by: Affendey, Lilly Suriani, et al.
Published: (2008)
Content-based image retrieval using transfer learning and vector database
by: Shuo, Li, et al.
Published: (2022)
by: Shuo, Li, et al.
Published: (2022)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
3-L model: a model for checking the integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A framework for caching relevant data divisions for checking integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A framework for caching relevant data items for checking integrity constraints of mobile database
by: Dzolkhifli, Zarina, et al.
Published: (2008)
by: Dzolkhifli, Zarina, et al.
Published: (2008)
An efficient schema transformation technique for data migration from relational to column-oriented databases
by: Zaidi, Norwini, et al.
Published: (2022)
by: Zaidi, Norwini, et al.
Published: (2022)
A framework for improving integrity constraints checking of mobile databases by caching relevant data items.
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression
by: Mehdi, Osama A., et al.
Published: (2018)
by: Mehdi, Osama A., et al.
Published: (2018)
Avian-centric design
by: Abdul Shukor, Shureen Faris
Published: (2015)
by: Abdul Shukor, Shureen Faris
Published: (2015)
Missing values estimation for skylines in incomplete database
by: Alwan, Ali, et al.
Published: (2018)
by: Alwan, Ali, et al.
Published: (2018)
Internet of things centric based multi-activity recognition in smart home environment
by: Perumal, Thinagaran, et al.
Published: (2023)
by: Perumal, Thinagaran, et al.
Published: (2023)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Processing skyline queries in incomplete distributed databases
by: Alwan, Ali Amer, et al.
Published: (2016)
by: Alwan, Ali Amer, et al.
Published: (2016)
Processing skyline queries in incomplete distributed databases
by: Alwan, Ali Amer, et al.
Published: (2016)
by: Alwan, Ali Amer, et al.
Published: (2016)
Estimating missing values of skylines in incomplete database
by: Alwan, Ali A., et al.
Published: (2013)
by: Alwan, Ali A., et al.
Published: (2013)
Preference evaluation techniques of preference queries in database
by: Alwan, Ali A., et al.
Published: (2013)
by: Alwan, Ali A., et al.
Published: (2013)
Skyline queries over incomplete multidimensional database
by: Alwan, Ali Amer, et al.
Published: (2011)
by: Alwan, Ali Amer, et al.
Published: (2011)
Leveraging data lake architecture for predicting academic student performance
by: Abdul Rahim, Shameen Aina, et al.
Published: (2024)
by: Abdul Rahim, Shameen Aina, et al.
Published: (2024)
Hybrid query for video database system
by: Affendey, Lilly Suriani, et al.
Published: (2008)
by: Affendey, Lilly Suriani, et al.
Published: (2008)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
Design and Evaluation of a Learner-Centric Immersive Virtual Learning Environment for Physics Education
by: Pirker, J., et al.
Published: (2013)
by: Pirker, J., et al.
Published: (2013)
A model for ranking and selecting integrity tests in a distributed database
by: Alwan, Ali A., et al.
Published: (2010)
by: Alwan, Ali A., et al.
Published: (2010)
A framework for checking and ranking integrity constraints in a distributed database
by: Alwan, Ali Amer, et al.
Published: (2011)
by: Alwan, Ali Amer, et al.
Published: (2011)
Improved integrity constraints checking in distributed databases by exploiting local checking.
by: Alwan, Ali Amer, et al.
Published: (2009)
by: Alwan, Ali Amer, et al.
Published: (2009)
Analysis of integrity tests for checking integrity constraints in a distributed database
by: Alwan, Ali Amer, et al.
Published: (2007)
by: Alwan, Ali Amer, et al.
Published: (2007)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Conceptual database design for smart medical clinical system
by: Mohd Sani, Nor Fazlida, et al.
Published: (2012)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2012)
Missing values estimation for skylines in incomplete database
by: Aljuboori, Ali A.Alwan, et al.
Published: (2018)
by: Aljuboori, Ali A.Alwan, et al.
Published: (2018)
Preference evaluation techniques of preference queries in database
by: Aljuboori, Ali A.Alwan, et al.
Published: (2013)
by: Aljuboori, Ali A.Alwan, et al.
Published: (2013)
Estimating missing values of skylines in incomplete database
by: Aljuboori, Ali A.Alwan, et al.
Published: (2013)
by: Aljuboori, Ali A.Alwan, et al.
Published: (2013)
Similar Items
-
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013) -
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016) -
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011) -
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006)