Show simple item record

dc.contributor.authorPollonais, Seanen_GB
dc.contributor.authorMaple, Carstenen_GB
dc.date.accessioned2013-02-28T14:57:33Z
dc.date.available2013-02-28T14:57:33Z
dc.date.issued2006
dc.identifier.citationMaple, C., and Pollonais, S. (2006) 'An Integrated Approach to Web Application Development', in IADIS International Conference e-Society 2006, 13-16 July, Dublin, Irelanden_GB
dc.identifier.isbn972892416X
dc.identifier.urihttp://hdl.handle.net/10547/270645
dc.description.abstractSoftware systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries.
dc.language.isoenen
dc.publisherIADISen_GB
dc.relation.urlhttp://www.iadis.net/dl/Search_list_open.asp?code=2802en_GB
dc.subjectweb securityen_GB
dc.subjectsoftware developmenten_GB
dc.subjectsecurity designen_GB
dc.titleAn integrated approach to web application developmenten
dc.typeConference papers, meetings and proceedingsen
html.description.abstractSoftware systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries.


This item appears in the following Collection(s)

Show simple item record