An integrated approach to web application development
dc.contributor.author | Pollonais, Sean | en_GB |
dc.contributor.author | Maple, Carsten | en_GB |
dc.date.accessioned | 2013-02-28T14:57:33Z | |
dc.date.available | 2013-02-28T14:57:33Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Maple, C., and Pollonais, S. (2006) 'An Integrated Approach to Web Application Development', in IADIS International Conference e-Society 2006, 13-16 July, Dublin, Ireland | en_GB |
dc.identifier.isbn | 972892416X | |
dc.identifier.uri | http://hdl.handle.net/10547/270645 | |
dc.description.abstract | Software systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries. | |
dc.language.iso | en | en |
dc.publisher | IADIS | en_GB |
dc.relation.url | http://www.iadis.net/dl/Search_list_open.asp?code=2802 | en_GB |
dc.subject | web security | en_GB |
dc.subject | software development | en_GB |
dc.subject | security design | en_GB |
dc.title | An integrated approach to web application development | en |
dc.type | Conference papers, meetings and proceedings | en |
html.description.abstract | Software systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries. |