An Analytical Study and Synthesis on Web server Security
Keywords:
Adjustable, Open Source, Protection Profile, Security, Web Server, Web ComponentAbstract
Web servers are being as a viable means to access Internet-based applications. Latest Approaches to secure Web servers are not much efficient or robust enough to protect and their applications from hackers. There are several approaches and analogies to examine the minimum-security requirements of a system. But The Highly efficient Techniques approaches as Protection profile, a systematic approach Therefore, we derive the Web security components that make a secure Web server from the Web Server Protection Profile. Study of A component-based framework as well as an open source solution has been done subsequently in this paper We believe that after the studying of such a system (implemented and deployed later), it will function reliably and effectively. This work aims at establishing the provable reliability of construction and the feasibility of component-based solutions for the secure Web server. This paper gives a theoretical approach and analogy of Profiling a web server including All three basic security models together( System security, Transmission security & Access Control System)etc.
References
. Dustin Lee, Jeff Rowe, Calvin Ko, Karl Levitt," Detecting and Defending againstWeb-Server Fingerprinting.
. Aviel D. Rubin (AT&T Labs), Daniel E. Geer Jr. Certco,"A Servey of Web Security .
. A.D. Rubin, D. Geer, and M.J. Ranum, Web Security Sourcebook, John Wiley & Sons, New York, 1997.
. Jared Karro, Jie Wang," Protecting Web Servers from Security Holes in Server-Side Includes.
. Sheng-Kang Lin ," From Web Server Security to Web Components Security.
. Christian Gilmore, David Kormann, and Aviel D. Rubin ―Secure Remote Access to an Internal Web Server,‖ IEEE Network, Val. 13, Issue 6, pp. 31-37, Nov.lDec., 1999.
. Dustin Lee, Jeff Rowe, Calvin KO, & Karl Levitt, detecting & defending against web server Fingerprinting, II In the 18-Annual Computer
security Application Conference (ACSAC’OZj, pp. 321-330, Dec. 9. 2002).
. 8) S. Jiang, S. Smith, and K. Minami, ―Securing Web Servers against Insider Attack,‖ In the 17‗h Annual Computer Security Applications
Conference (ACSAC‘OI j, pp. 265-276,
. Jane Curry.”Methods of monitoring processes with Zenoss Draft. www.skills-1st.co.uk
. JJ.G. Steiner, C. NEuman & J.I. SchillerKerberos: An Authenticatin service for open Network Systems, II Proc. Winter 1988 general Conf. USENIX Assoc., Berkeley, Calif. 1988, pp. 191-202.
. M.K. Reiter and A.D. Rubin, ―Crowds: Anonymous nWeb Transactions,‖ ACM Trans. Information Systems Security, Apr. 1998; see
also http://www.research.att. com/projects/crowds.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.