A Software Development Methodology for Secure Web Application
How to cite (IJASEIT) :
Eduardo Fernandez-Medinaa, Juan Trujillob, Rodolfo Villarroelc, and Mario Piattinia., 2007, “Developing secure data warehouses with a UML extension,” Journal Information Systems archive, Vol 32, No 6, pp. 826-856.
G.Popp, J. Jurjens, G.Wimmel, R. Breu., 2003, “Security-Critical System Development with Extended Use Case,” Asia-Pacific Software Engineering Conference, 5-1 self.
Madan, s., 2010, “Security Standards Perspective to Fortify Web Database Applications From Code Injection Attacks,” International Conference on Intelligent Systems, Modelling and Simulation(ISMS), Vol. 10, pp. 226-230.
lqra Basharat, Farooque Anam, Abdul Wahab Muzaffar., 2012, “Database Security and Encryption: A Survey Study,” International Journal of Computer Application, Vol. 47, No. 12, pp28-34.
David Basin, Jí¼rgen Doser, and Torsten Lodderstedt., 2006, “Model Driven Security: from UML Models to Access Control Infrastructures,” ACM Transactions on Software Engineering and Methodology (TOSEM), Vol. 15 No. 1, pp39-91.
Kyung-Soo Joo, Jung-Woong Woo., 2012, “A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Application Based on Object-Relational Database -Focusing on Oracle 11g-“, Korea Society of Internet Information, Vol 17, No 12, pp. 169-177.
Byeong-Seon Jeon., 2005, CBD WHAT&HOW, Wowbooks Publishing Company, Seoul.
Heung-Seok Chae., 2009, Object-oriented CDB Project for UML and Java as learning, Hanbit Media. Seoul.
Mang Su, Fenghua Li, Guozhen Shi, and Li Li, “An Action-Based Access Control Moedl for Multi-level Security,” IJSIA, 6, pp. 359-366 (2012).
Allaoua Maamir, Abdelaziz Fellah, Lina A. Salem, “Fine Granularity Access Rights for Information Flow Control in Object-Oriented Systems,” IJSIA, 2, pp. 81-92 (2008).
Brett D. McLaughlin, Gary Pollice, David West., 2007, Head First Object-Oriented Analysis & Design, habit media, Seoul.
Seung-Yun Bang, Kyung-Soo Joo., 2003, “Design Methodology for XML Schema Application based on UML,” Soonchunhyang Univ, pp.71-75.
Mang Su, Fenghua Li, Guozhen Shi, Li Li., “An Action-Based Access Control Model for Multi-level Security.”, International Journal of Security and Its Applications, 6(2), 359-366. 2012
Egbunike, Celestine, and S. Rajendran. "The implementation of the negative database as a security technique on a generic database system.", Circuit, Power and Computing Technologies (ICCPCT), 2017 International Conference on. IEEE, 2017.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).