Abstract
Software systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries.
| Original language | English |
|---|---|
| Title of host publication | nan |
| Publisher | IADIS |
| ISBN (Electronic) | 972892416X |
| ISBN (Print) | 972892416X |
| Publication status | Published - 1 Jan 2006 |
| Event | IADIS International Conference e-Society 2006 - Dublin Duration: 13 Jul 2006 → 16 Jul 2006 |
Conference
| Conference | IADIS International Conference e-Society 2006 |
|---|---|
| City | Dublin |
| Period | 13/07/06 → 16/07/06 |
| Other | IADIS International Conference e-Society 2006 (13/07/2006-16/07/2006, Dublin) |
Keywords
- web application development
Fingerprint
Dive into the research topics of 'An integrated approach to web application development'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver