skip to main content
10.1145/1947940.1948057acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccsConference Proceedingsconference-collections
research-article

Evaluation of web application security risks and secure design patterns

Published:12 February 2011Publication History

ABSTRACT

The application of security in web application is of profound importance due to the extended use of web for business. Most of the attacks, are either because the developers are not considering security as a concern or due to the security flaws in designing and developing the applications. The enforcement of security in the software development life cycle of the application may reduce the high cost and efforts associated with implementing security at a later stage. For this purpose, various attempts has been made to define some security patterns keeping the attacks in mind. The developers now can use these patterns but sometimes it is difficult to choose a pattern from the large list, which may or may not suit the context. This paper is based on analyzing the existing security patterns. Here web application vulnerabilities has been classified and pairing is done between each vulnerability and a suitable pattern.

References

  1. B. Blakely and C. Heath. Security design pattern, tech report g031. OpenGroup, 2004.Google ScholarGoogle Scholar
  2. A. M. Braga, C. M. F. Rubira, and R. Dahab. Tropyc: A pattern language for cryptographic software. PLoP, 1998.Google ScholarGoogle Scholar
  3. F. L. Brown and E. B. Fernandez. The authenticator pattern. PLop, 1999.Google ScholarGoogle Scholar
  4. C. Dougherty, K. Sayre, R. C. Seacord, D. Svoboda, and K. Togashi. Secure Design Patterns. Software Engineering Institute, 2009.Google ScholarGoogle Scholar
  5. E. B. Fernandez and R. Pan. A pattern language for security models. PLop, 2001.Google ScholarGoogle Scholar
  6. E. B. Fernandez, J. C. Pelae, and M. M. Larrondopetrie. Security pattern for voice over ip network. In International multi conference on Computing in Global Information Technology(ICCGI'07), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object Oriented Software. Addison-Wesley, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Hafiz. Secure pre-forking- a pattern for performance and secuirty. PLoP, 2005.Google ScholarGoogle Scholar
  9. S. T. Halkidis, A. Chatzigeorgiou, and G. Stephanides. A quantitative evaluation of security patterns. International Conference on Information and Communication Security(ICICS), 2004.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Jurens. Secure system development with uml. Springer, 2004.Google ScholarGoogle Scholar
  11. D. M. Kienzle and M. C. Elder. Final technical report: Security pattern for web application development, 2002. http://www.scrypt.net/celer/securitypatterns/final.Google ScholarGoogle Scholar
  12. P. Morrision and E. B. Fernandez. Securing the broken pattern. In 11th European Conference on Pattern Language of Programs (EuroPLoP). PLop, 2006.Google ScholarGoogle Scholar
  13. OWASP. Owasp top 10 application security risks-2010. http://www.owasp.org/index.php/Category: OWASP_Top_Ten_Project.Google ScholarGoogle Scholar
  14. T. priebe, E. Fernandez, J. I. Mehlau, and G. Pernull. A parten system for access control. 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2004.Google ScholarGoogle Scholar
  15. Romanosky. Security design patterns. technical report. http://www.cgisecurity.com/lib/securityDesignPatterns.pdf, 2001.Google ScholarGoogle Scholar
  16. S. Romanosky, A. Acquisti, J. Hong, L. F. Carnor, and B. Friedman. Privacy pattern for online interaction. In PLop 2006 Conference. PLop, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Schumacher, E. B. Fernandez, D. Hybertson, and F. Buschmann. Security Patterns: Integrating Security And System Engineering. John Wiley and Sons Inc., 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Steel, R. Nagappan, and R. Lai. Best Practice and Strategy for J2EE, Web Service and Identity Management. Prentice Hall, 2005.Google ScholarGoogle Scholar
  19. J. Yoder and J. Barcalow. Architectural patterns for enabling application security. In International Conference on Pattern Language of Programs. PLoP, 1997.Google ScholarGoogle Scholar

Index Terms

  1. Evaluation of web application security risks and secure design patterns

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & Security
                  February 2011
                  656 pages
                  ISBN:9781450304641
                  DOI:10.1145/1947940

                  Copyright © 2011 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 12 February 2011

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader