{"title":"A study of AJAX vulnerability in Web 2.0 applications","authors":"A. Bin Al-Tameem, P. Chittikala, P. Pichappan","doi":"10.1109/ICADIWT.2008.4664319","DOIUrl":null,"url":null,"abstract":"The current period is marked by the increased application of Web servers and the use of web 2.0 for many utilities. As the access to the Web 2.0 by the global users is on ever increase, the hijackers eye on the Web 2.0 for attacks. The principal technology behind the Web 2.0 is the AJAX which now becomes the target of many security attacks. In the current study we have introduced AJAX PRO, a prototype tool for AJAX vulnerability prevention has visualized an enhanced architecture to reflect the AJAX vulnerability and the architecture is applied in randomized trails and the results call for increased applications.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"19 S1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICADIWT.2008.4664319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
The current period is marked by the increased application of Web servers and the use of web 2.0 for many utilities. As the access to the Web 2.0 by the global users is on ever increase, the hijackers eye on the Web 2.0 for attacks. The principal technology behind the Web 2.0 is the AJAX which now becomes the target of many security attacks. In the current study we have introduced AJAX PRO, a prototype tool for AJAX vulnerability prevention has visualized an enhanced architecture to reflect the AJAX vulnerability and the architecture is applied in randomized trails and the results call for increased applications.