Security in computing
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Security models for web-based applications
Communications of the ACM
Commercializing Open Source Software
Queue - The Business of Open Source
A performance comparison of dynamic Web technologies
ACM SIGMETRICS Performance Evaluation Review
Securing web application code by static analysis and runtime protection
Proceedings of the 13th international conference on World Wide Web
The essence of command injection attacks in web applications
Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Increased security through open source
Communications of the ACM - The patent holder's dilemma: buy, sell, or troll?
Hi-index | 0.00 |
Introduction The processes behind corporate efforts to create, manage, publish, and archive Web information has also evolved using Web Content Management Systems (WCMS). WCMS allow teams to maintain Web content in a dynamic fashion through a user friendly interface and a modular application approach. This dynamic "on-the-fly" content creation provides Web site authors several advantages including access to information stored in databases, ability to personalize Web pages according to individual user preferences, and the opportunity to deliver a much more interactive user experience than static Web pages alone.11 However, there are distinct disadvantages as well. Dynamically generating Web content can significantly impact Web server performance, reduce the scalability of the Web site and create security vulnerabilities or denial of service.11 Organizations are adopting information technology without understanding such security concerns.1 Moreover, as Mostefaoui7 points out, even though many attempts have been made to understand the security architecture, a generic security framework is needed. Recent research amplifies the concerns and benefits of security in open source systems.2 However, there is a need for organizations to understand how to evaluate these open source systems and this paper highlights how an evaluation technique in terms of security may be used in an organization to assess a short list of possible WMCS systems. This article focuses on security issues in WCMS and the objective is to understand the security issues as well as to provide a generic security framework. The contributions of this paper are to: 1. Integrate the goals of security with eight dimensions of WCMS, 2. Specify how to secure the eight dimensions of WCMS, 3. Formulate a framework of security using this integrated view of security goals and security dimensions, and 4. Address the security of the Web architecture at WCMS software application level using the framework and evaluate security features in popular WCMS used in the industry.