Design and Implementation of New Data Validation Service (NDVS) Using Semantic Web Technologies in Web Applications

被引:0
作者
Aljawarneh, Shadi [1 ]
Alkhateeb, Faisal [2 ]
机构
[1] Al Isra Private Univ, Fac Sci & Informat Technol, POB 22, Amman 11622, Jordan
[2] Yarmouk Univ, Irbid, Jordan
来源
WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II | 2009年
关键词
Web application; data integrity; RDFa; web system; ontology; semantic web technologies; data validation; vulnerabilities; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We have designed a novel server-side data validation service, based upon semantic web technologies to solve the lack of data validation and bypassing validation issues. The NDVS consists of five components: RDFa annotation for elements of web pages, interceptor, RDFa extractor, RDF parser, and data validator. Our solution is implemented as a prototype. In this paper, we have conducted a pilot study to prevent the security vulnerabilities at the application level such as SQL injections. The results of this initial study have shown that the proposed service (NDVS) could provide a high coverage of prevention of security vulnerabilities.
引用
收藏
页码:179 / +
页数:2
相关论文
共 21 条
[11]  
HALFOND G, 2006, ICSE 06, P795
[12]  
HONKALA M, 2007, WEB USER INTERACTION
[13]  
Huang Y.-W., 2003, P 12 INT C WORLD WID, P148, DOI [10.1145/775152.775174, DOI 10.1145/775152.775174]
[14]   Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper) [J].
Jovanovic, Nenad ;
Kruegel, Christopher ;
Kirda, Engin .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :258-+
[15]  
MIKKO H, 2005, ICWE, P340
[16]   Bypass testing of web applications [J].
Offutt, J ;
Wu, Y ;
Du, XC ;
Huang, H .
15TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2004, :187-197
[17]  
*OPEN WEB APPL SEC, 2003, 10 MOST CRIT WEB APP
[18]   Analysis and testing of Web applications [J].
Ricca, F ;
Tonella, P .
PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2001, :25-34
[19]   Specifying and enforcing application-level Web security policies [J].
Scott, D ;
Sharp, R .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (04) :771-783
[20]  
Sedaghat S, 2002, COMMUN ACM, V45, P33, DOI 10.1145/581571.581590