Self-protection mechanisms for web applications a case study

C. Raibulet, A. Leporati, A. Metelli

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.Self-protection mechanisms aim to improve security of software systems at runtime. They are able to automatically prevent and/or react to security threats by observing the state of a system and its execution environment, by reasoning on the observed state, and by applying enhanced security strategies appropriate for the current threat. Self-protection mechanisms complement traditional security solutions which are mostly static and focus on the boundaries of a system, missing in this way the overall picture of a system's security. This paper presents several self-protection mechanisms which have been developed in the context of a case study concerning a home banking system. Essentially, the mechanisms described in this paper aim to improve the security of the system in the following two scenarios: users' login and bank operations. Furthermore, the proposed self-protection mechanisms are presented through the taxonomy proposed in (Yuan, 2014).
Original languageEnglish
Title of host publicationENASE 2016 - Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering
EditorsL. Maciaszek, J. Filipe
PublisherSciTePress
Pages181-188
ISBN (Electronic)9789897581892
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, ENASE 2016 - Rome, Italy
Duration: 27 Apr 201628 Apr 2016

Conference

Conference11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, ENASE 2016
Country/TerritoryItaly
CityRome
Period27/04/1628/04/16

Fingerprint

Dive into the research topics of 'Self-protection mechanisms for web applications a case study'. Together they form a unique fingerprint.

Cite this