A Study on the Web Services Vulnerability Assessment Plan
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cha, Sang-Wook | - |
dc.contributor.author | Park, Jong-Suk | - |
dc.contributor.author | Cho, Jangyoun | - |
dc.contributor.author | Han, Kyeong-seok | - |
dc.contributor.author | Kim, Jong-Bae | - |
dc.date.available | 2018-05-07T11:10:39Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2016-07 | - |
dc.identifier.issn | 1738-9976 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5546 | - |
dc.description.abstract | Many companies and governments have been rapidly progressing and expanding their Web services, and have recently invested a lot of time and money for a safer cyber environment to protect implementation and information assets and personal information. However, web hacking techniques to gain knowledge and evolution of web hacking through the web site are still putting a serious threat to Web services. In this paper, OWASP TOP10, NIS 8 vulnerability, Financial Supervisory Service (FSS) designed according to the simulated hacking scenarios 11 vulnerability to attacks based proposes a method for analyzing the vulnerability by check. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SCIENCE & ENGINEERING RESEARCH SUPPORT SOC | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | - |
dc.title | A Study on the Web Services Vulnerability Assessment Plan | - |
dc.type | Article | - |
dc.identifier.doi | 10.14257/ijsia.2016.10.7.18 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.10, no.7, pp.203 - 212 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000384817200019 | - |
dc.identifier.scopusid | 2-s2.0-84983078651 | - |
dc.citation.endPage | 212 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 203 | - |
dc.citation.title | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | - |
dc.citation.volume | 10 | - |
dc.contributor.affiliatedAuthor | Han, Kyeong-seok | - |
dc.contributor.affiliatedAuthor | Kim, Jong-Bae | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.oadoiVersion | published | - |
dc.subject.keywordAuthor | Web services | - |
dc.subject.keywordAuthor | vulnerability | - |
dc.subject.keywordAuthor | threat | - |
dc.subject.keywordAuthor | information Assets | - |
dc.subject.keywordAuthor | simulated hacking | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.