Two level security approaches for secure XML database centric web services against xpath injections
Web services are deployed using eXtensible Markup Language (XML), which is an independent language for easy transportation and storage. As an important transportation for data, Web services has become increasingly vulnerable to malicious attacks that could affect essential properties of inform...
| Main Author: | Asmawi, Aziah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/68604/ http://psasir.upm.edu.my/id/eprint/68604/1/FSKTM%202016%2034.pdf |
Similar Items
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Integrity Constraints Maintenance For Parallel Databases
by: Ahmad Hamed Hanandeh, Feras
Published: (2006)
by: Ahmad Hamed Hanandeh, Feras
Published: (2006)
An approach for matching relational database schemas
by: Karasneh, Yaser Mohammad
Published: (2011)
by: Karasneh, Yaser Mohammad
Published: (2011)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
X3-Miner: Mining patterns from XML database
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
From database to semantic web ontology: an overview
by: Zhao, Shuxin, et al.
Published: (2007)
by: Zhao, Shuxin, et al.
Published: (2007)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Development of Ms Access 97 Based Wildlife Database: Aves and Mammalia of Malaysia
by: Mohammad Afandi, Syamsul Herman
Published: (2000)
by: Mohammad Afandi, Syamsul Herman
Published: (2000)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
User-defined view automation of genomic databases
by: Robinson, A., et al.
Published: (2005)
by: Robinson, A., et al.
Published: (2005)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
A tree-based measure for hierarchical data in mixed databases
by: Hassan, Diman
Published: (2016)
by: Hassan, Diman
Published: (2016)
Development of an assertion model of integrity constraints in object-oriented databases
by: Zaqaibeh, Belal Mohammad
Published: (2006)
by: Zaqaibeh, Belal Mohammad
Published: (2006)
A Design and Implementation of Version Model in Object-Oriented Databases
by: Yazid, Zulkifli
Published: (1997)
by: Yazid, Zulkifli
Published: (1997)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Mediating databases and the semantic web: a methodology for building domain ontologies from databases and existing ontologies
by: Zhao, Shuxin, et al.
Published: (2007)
by: Zhao, Shuxin, et al.
Published: (2007)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
E-book for database subject / Aznira Abdullah Zawawi
by: Abdullah Zawawi, Aznira
Published: (2007)
by: Abdullah Zawawi, Aznira
Published: (2007)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
Sufism literature in online databases
by: Ismail@Ahmad, Muslim, et al.
Published: (2011)
by: Ismail@Ahmad, Muslim, et al.
Published: (2011)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
Australia's 'New Security' Challenges
by: Hubbard, Christopher
Published: (2004)
by: Hubbard, Christopher
Published: (2004)
Malaysian sign language database for research
by: Maarif, Haris Al Qodri, et al.
Published: (2012)
by: Maarif, Haris Al Qodri, et al.
Published: (2012)
Online databases at Saudi Academic libraries
by: Mansour, Ezzat Abdul Aziz, et al.
Published: (2011)
by: Mansour, Ezzat Abdul Aziz, et al.
Published: (2011)
An analysis on the uses of data modeling in database application development / Hafiza Ahmad
by: Ahmad, Hafiza
Published: (2004)
by: Ahmad, Hafiza
Published: (2004)
‘Securing’ the Indian Ocean? Competing regional security constructions
by: Rumley, Dennis, et al.
Published: (2012)
by: Rumley, Dennis, et al.
Published: (2012)
Software Development For On-Line Energy Monitoring And Control System Through The Web
by: Mohd Radzi, Mohd Amran
Published: (2002)
by: Mohd Radzi, Mohd Amran
Published: (2002)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
Preference evaluation techniques of preference queries in database
by: Aljuboori, Ali A.Alwan, et al.
Published: (2013)
by: Aljuboori, Ali A.Alwan, et al.
Published: (2013)
Similar Items
-
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012) -
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013) -
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019) -
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023) -
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)