CFP last date
20 January 2025
Reseach Article

Web Security Techniques: Review and Evaluation

by Song Feng Lu, Haider Ali Mohammed, Omer Farooq
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 167 - Number 2
Year of Publication: 2017
Authors: Song Feng Lu, Haider Ali Mohammed, Omer Farooq
10.5120/ijca2017914172

Song Feng Lu, Haider Ali Mohammed, Omer Farooq . Web Security Techniques: Review and Evaluation. International Journal of Computer Applications. 167, 2 ( Jun 2017), 1-5. DOI=10.5120/ijca2017914172

@article{ 10.5120/ijca2017914172,
author = { Song Feng Lu, Haider Ali Mohammed, Omer Farooq },
title = { Web Security Techniques: Review and Evaluation },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 167 },
number = { 2 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume167/number2/27740-2017914172/ },
doi = { 10.5120/ijca2017914172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:13:43.102421+05:30
%A Song Feng Lu
%A Haider Ali Mohammed
%A Omer Farooq
%T Web Security Techniques: Review and Evaluation
%J International Journal of Computer Applications
%@ 0975-8887
%V 167
%N 2
%P 1-5
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Any web security system should achieve three conceptual goals are; confidentiality, integrity and Non-repudiation, and authentication. Also any system of communication when it is designed with these security services are taken into account and these security services must be defined and can be shortened format as (CIA).In this paper, we are going to discuss the theoretical background on the objectives of web security, and it will be touched upon the other subjects such as symmetric cryptography, asymmetric cryptography, the hash function, confidentiality, integrity, non-repudiation, Authentication, Communication and Network Security and its types ,and we will focus on the digital signature concepts.

References
  1. Shava FB, Van Greunen D. Factors affecting user experience with security features: A case study of an academic institution in Namibia. InInformation Security for South Africa, 2013 2013 Aug 14 (pp. 1-8). IEEE.
  2. Mathur R, Agarwal S, Sharma V. Solving security issues in mobile computing using cryptography techniques—A Survey. InComputing, Communication & Automation (ICCCA), 2015 International Conference on 2015 May 15 (pp. 492-497). IEEE.
  3. Mandal BK, Bhattacharyya D, Bandyopadhyay SK. Designing and performance analysis of a proposed symmetric cryptography algorithm. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on 2013 Apr 6 (pp. 453-461). IEEE.
  4. Al Shehhi MA, Baek J, Yeun CY. The use of Boolean functions in stream ciphers. InInternet Technology and Secured Transactions (ICITST), 2011 International Conference for 2011 Dec 11 (pp. 29-33). IEEE.
  5. Dewu X, Wei C. A survey on cryptanalysis of block ciphers. InComputer Application and System Modeling (ICCASM), 2010 International Conference on 2010 Oct 22 (Vol. 8, pp. V8-218). IEEE.
  6. Azaim MH, Sudiharto DW, Jadied EM. Design and implementation of encrypted SMS on Android smartphone combining ECDSA-ECDH and AES. InMultimedia and Broadcasting (APMediaCast), 2016 Asia Pacific Conference on 2016 Nov 17 (pp. 18-23). IEEE.
  7. Nugroho KA, Hangga A, Sudana IM. SHA-2 and SHA-3 based sequence randomization algorithm. InScience and Technology-Computer (ICST), International Conference on 2016 Oct 27 (pp. 150-154). IEEE.
  8. Agarwal N, Rana A, Pandey JP. Proxy signatures for secured data sharing. InCloud System and Big Data Engineering (Confluence), 2016 6th International Conference 2016 Jan 14 (pp. 255-258). IEEE.
  9. Devi TR. Importance of Cryptography in Network Security. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on 2013 Apr 6 (pp. 462-467). IEEE.
  10. Idalino TB, Coelho M, Martina JE. Automated issuance of digital certificates through the use of federations. InAvailability, Reliability and Security (ARES), 2016 11th International Conference on 2016 Aug 31 (pp. 725-732). IEEE.
  11. Bruce N, Kang YJ, Sain M, Lee HJ. An approach to designing a network security-based application for communications safety. InAdvances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on 2015 Aug 25 (pp. 1002-1009). IEEE.
  12. Zheng K, Jiang W. A token authentication solution for hadoop based on kerberos pre-authentication. InData Science and Advanced Analytics (DSAA), 2014 International Conference on 2014 Oct 30 (pp. 354-360). IEEE.
  13. Mensah P, Blanc G, Okada K, Miyamoto D, Kadobayashi Y. AJNA: Anti-phishing JS- based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. InBuilding Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2015 4th International Workshop on 2015 Nov 5 (pp. 74-84). IEEE.
  14. Heinemann C, Chaduvu SS, Byerly A, Uskov A. OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs. InElectro Information Technology (EIT), 2016 IEEE International Conference on 2016 May 19 (pp. 0765-0770). IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric cryptography Asymmetric cryptography Hash Function Digital signature Integrity.