Decision Support and Business Intelligence Systems (8th Edition)
Decision Support and Business Intelligence Systems (8th Edition)
The anti-social tagger: detecting spam in social bookmarking systems
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
Identification of potential malicious web pages
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Anatomy of drive-by download attack
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Evaluating the perceived and estimated quality in use of Web 2.0 applications
Journal of Systems and Software
Hi-index | 0.00 |
In this paper we survey and validate some of the known security and reliability issues in Web 2.0 based application development. We see in Web 2.0 application development an evolving paradigm shift in security focus from servers to clients. Our approach consists of critically reviewing relevant literature including books, published articles, vendor documentations, white papers, and expert opinions; performing a detailed technical examination of the claims of exploits; and presenting the findings. Then we examine some industry best practices in Web 2.0 application security, and list the most effective approaches and countermeasures. Finally, we present some recommendations to improve the security environment in Web 2.0, as well as an indication of some future research in this area. The paper is aimed at both developers and users of Web 2.0 based systems.