2.50
Hdl Handle:
http://hdl.handle.net/10547/270645
Title:
An integrated approach to web application development
Authors:
Pollonais, Sean; Maple, Carsten
Abstract:
Software systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries.
Citation:
Maple, C., and Pollonais, S. (2006) 'An Integrated Approach to Web Application Development', in IADIS International Conference e-Society 2006, 13-16 July, Dublin, Ireland
Publisher:
IADIS
Issue Date:
2006
URI:
http://hdl.handle.net/10547/270645
Additional Links:
http://www.iadis.net/dl/Search_list_open.asp?code=2802
Type:
Conference papers, meetings and proceedings
Language:
en
ISBN:
972892416X
Appears in Collections:
Centre for Research in Distributed Technologies (CREDIT)

Full metadata record

DC FieldValue Language
dc.contributor.authorPollonais, Seanen_GB
dc.contributor.authorMaple, Carstenen_GB
dc.date.accessioned2013-02-28T14:57:33Z-
dc.date.available2013-02-28T14:57:33Z-
dc.date.issued2006-
dc.identifier.citationMaple, C., and Pollonais, S. (2006) 'An Integrated Approach to Web Application Development', in IADIS International Conference e-Society 2006, 13-16 July, Dublin, Irelanden_GB
dc.identifier.isbn972892416X-
dc.identifier.urihttp://hdl.handle.net/10547/270645-
dc.description.abstractSoftware systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries.en_GB
dc.language.isoenen
dc.publisherIADISen_GB
dc.relation.urlhttp://www.iadis.net/dl/Search_list_open.asp?code=2802en_GB
dc.subjectweb securityen_GB
dc.subjectsoftware developmenten_GB
dc.subjectsecurity designen_GB
dc.titleAn integrated approach to web application developmenten
dc.typeConference papers, meetings and proceedingsen
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.