By Topic

A study of AJAX vulnerability in Web 2.0 applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Bin Al-Tameem, A. ; Fac. of Comput.&Inf. Sci., Al Imam Saud Bin Univ., Riyadh ; Chittikala, P. ; Pichappan, P.

The current period is marked by the increased application of Web servers and the use of web 2.0 for many utilities. As the access to the Web 2.0 by the global users is on ever increase, the hijackers eye on the Web 2.0 for attacks. The principal technology behind the Web 2.0 is the AJAX which now becomes the target of many security attacks. In the current study we have introduced AJAX PRO, a prototype tool for AJAX vulnerability prevention has visualized an enhanced architecture to reflect the AJAX vulnerability and the architecture is applied in randomized trails and the results call for increased applications.

Published in:

Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008. First International Conference on the

Date of Conference:

4-6 Aug. 2008