Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
A Secure Software Design Pattern in ...
~
Colorado Technical University.
A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting./
Author:
Parsons, Matthew John.
Description:
1 online resource (136 pages)
Notes:
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
Subject:
Computer science. -
Online resource:
click for full text (PQDT)
ISBN:
9780355153354
A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting.
Parsons, Matthew John.
A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting.
- 1 online resource (136 pages)
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
Thesis (D.C.S.)--Colorado Technical University, 2017.
Includes bibliographical references
Software needs to address security through secure software design patterns. Secure software design patterns can help remediate software security vulnerabilities. Sensitive information is stored, transmitted and processed by software that lacks adequate built-in security. Malicious attackers see value in the data and the vulnerabilities inherent in the design of software systems. Computers must preserve the access and integrity of confidential data processed by these software systems. This dissertation evaluates how the Microsoft Security Controls in Visual Studio 2015 and the 4.5 .NET framework can prevent reflected cross-site scripting in a .NET application with a POST request to another page with string input. One hundred malicious scripts were sent to the application before and after the implementation of the Microsoft Security Controls in the 4.5 .NET framework. The results of the tests were recorded and then evaluated using quantitative methods to see if there is a relationship between security controls and secure software design patterns.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355153354Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting.
LDR
:02257ntm a2200337K 4500
001
914436
005
20180712070705.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355153354
035
$a
(MiAaPQ)AAI10607546
035
$a
(MiAaPQ)ctu:10329
035
$a
AAI10607546
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Parsons, Matthew John.
$3
1187694
245
1 2
$a
A Secure Software Design Pattern in the Prevention for Reflected Cross-Site Scripting.
264
0
$c
2017
300
$a
1 online resource (136 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
500
$a
Adviser: Cynthia Calongne.
502
$a
Thesis (D.C.S.)--Colorado Technical University, 2017.
504
$a
Includes bibliographical references
520
$a
Software needs to address security through secure software design patterns. Secure software design patterns can help remediate software security vulnerabilities. Sensitive information is stored, transmitted and processed by software that lacks adequate built-in security. Malicious attackers see value in the data and the vulnerabilities inherent in the design of software systems. Computers must preserve the access and integrity of confidential data processed by these software systems. This dissertation evaluates how the Microsoft Security Controls in Visual Studio 2015 and the 4.5 .NET framework can prevent reflected cross-site scripting in a .NET application with a POST request to another page with string input. One hundred malicious scripts were sent to the application before and after the implementation of the Microsoft Security Controls in the 4.5 .NET framework. The results of the tests were recorded and then evaluated using quantitative methods to see if there is a relationship between security controls and secure software design patterns.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Computer engineering.
$3
569006
650
4
$a
Information science.
$3
561178
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0464
690
$a
0723
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Colorado Technical University.
$b
Information Technology.
$3
1185287
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10607546
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login