Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems

被引:0
|
作者
Aaqib, Syed Mutahar [1 ]
Sharma, Lalitsen [1 ]
机构
[1] Univ Jammu, Dept Comp Sci & IT, Jammu, J&K, India
来源
关键词
Web server; Web server security; Information security;
D O I
10.1007/978-981-10-8848-3_42
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a novel approach to study, identify, and evaluate the security mechanisms in-place across various Web server platforms. These security mechanisms are collected and compiled from various sources. A set of security checks are framed to identify the implementation of these security mechanisms in diverse Web server platforms. The paper is concluded with a case study which implements this approach.
引用
收藏
页码:441 / 447
页数:7
相关论文
共 32 条
  • [11] Evaluation on security and privacy of web-based learning systems
    Chan, YY
    Leung, CH
    Liu, JK
    3RD IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2003, : 308 - 309
  • [12] A testbed for performance evaluation of load-balancing strategies for Web server systems
    Sanghi, D
    Jalote, P
    Agarwal, P
    Jain, N
    Bose, S
    SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (04): : 339 - 353
  • [13] A hybrid approach for performance evaluation of Web-legacy client/server systems
    Makimoto, Naoki
    Sakata, Hiroyuki
    GRAMMAR OF TECHNOLOGY DEVELOPMENT, 2008, : 165 - +
  • [14] Cold Region Applications for In-Place Inclinometers Based on Microelectromechanical Systems Technology Four Evaluation Case Studies
    Darrow, Margaret M.
    Jensen, David D.
    TRANSPORTATION RESEARCH RECORD, 2014, (2433) : 1 - 9
  • [15] Performance Comparison and Evaluation Of Node.Js']Js And Traditional Web Server (IIS)
    Chitra, Lakshmi Prasanna
    Satapathy, Ravikanth
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [16] Quantitative comparison of bilateral teleoperation systems with various drive mechanisms and sensory configurations
    Kim, Keehoon
    Cavusoglu, M. Cenk
    Chung, Wan Kyun
    Lee, Jongwon
    2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13, 2006, : 3959 - 3964
  • [17] Cyber Security Exercises: A Comparison of Participant Evaluation Metrics and Scoring Systems
    Caliskan, Emin
    Topgul, M. Oguzhan
    Ottis, Rain
    STRATEGIC CYBER DEFENSE: A MULTIDISCIPLINARY PERSPECTIVE, 2017, 48 : 180 - 190
  • [18] Sensing systems efficiency evaluation and comparison for homeland security and homeland defense
    Pakhomov, Alexander A.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IX, 2010, 7666
  • [19] Practical Evaluation of Internet Systems' Security Mechanisms (vol 15, pg 38, 2017)
    Lubomski, P.
    Krawczyk, H.
    IEEE SECURITY & PRIVACY, 2017, 15 (03) : 4 - 4
  • [20] Trajectory control in redundant space robot systems: a comparative evaluation of various float mechanisms
    Ahmad, Sarfaraj
    Dalla, Vijay Kumar
    Prasad, Naresh
    Rayankula, Vitalram
    INTERNATIONAL JOURNAL OF INTELLIGENT ROBOTICS AND APPLICATIONS, 2024, : 900 - 913