[go: up one dir, main page]

Balasundram et al., 2013 - Google Patents

Prevention of SQL Injection attacks by using service oriented authentication technique

Balasundram et al., 2013

View PDF
Document ID
4107923822671944869
Author
Balasundram I
Ramaraj E
Publication year
Publication venue
International Journal of modeling and optimization

External Links

Snippet

Web applications have become steadily increased in daily routines activities and continue to integrate them. On-line reservations, paying bills and on-line shopping expect these web applications to be secure and reliable; the fear of SQL–Injection Attacks has become …
Continue reading at ijmo.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Fredj et al. An OWASP top ten driven survey on web application protection methods
Wei et al. Preventing SQL injection attacks in stored procedures
Stuttard et al. The web application hacker's handbook: Finding and exploiting security flaws
Li et al. A survey on server-side approaches to securing web applications
Nguyen-Tuong et al. Automatically hardening web applications using precise tainting
Yeole et al. Analysis of different technique for detection of SQL injection
Deepa et al. Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
Sheykhkanloo SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques
Kausar et al. SQL injection detection and prevention techniques in ASP .NET web application
Sharma et al. SQL injection attacks-a systematic review
Bhateja et al. A review of sql injection attack and various detection approaches
Dharam et al. Runtime monitoring technique to handle tautology based SQL injection attacks
Aich Secure query processing by blocking sql injection
Hammoudeh et al. The study on assessment of security web applications
Balasundram et al. Prevention of SQL Injection attacks by using service oriented authentication technique
Dharam et al. Runtime monitoring framework for SQL injection attacks
Gomaa et al. Survey on securing a querying process by blocking SQL injection
Dwivedi et al. Web application vulnerabilities: A survey
Sheykhkanloo A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks
Nunes Blended security analysis for web applications: Techniques and tools
Indrani et al. X–log authentication technique to prevent sql injection attacks
Pathan et al. Lethality of SQL injection against current and future internet technologies
Ingle et al. Attacks on web based software and modelling defence mechanisms
GUPTA et al. Web Security against SQL Injection Attack
Loughran et al. All about SQL injection attacks