2008 14th IEEE Pacific Rim International Symposium on Dependable Computing 2008
DOI: 10.1109/prdc.2008.45
|View full text |Cite
|
Sign up to set email alerts
|

Assessing and Comparing Security of Web Servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…While some web servers may be generally considered more secure than other web servers, the true extent of security is entirely dependent on the web-server developers and how often they patch up security flaws. In a study on assessing web server security, [23] analyzed five open-source web servers including Apache HTTPD2, Apache Tomcat 6.0.13, Apache Tomcat 6.0.16 and Apache Tomcat 6.0.13. They analyzed factors such as security policy, access control, communication and operation management, human resource security, information systems acquisition, development and maintenance and physical and environmental security.…”
Section: Api Securitymentioning
confidence: 99%
“…While some web servers may be generally considered more secure than other web servers, the true extent of security is entirely dependent on the web-server developers and how often they patch up security flaws. In a study on assessing web server security, [23] analyzed five open-source web servers including Apache HTTPD2, Apache Tomcat 6.0.13, Apache Tomcat 6.0.16 and Apache Tomcat 6.0.13. They analyzed factors such as security policy, access control, communication and operation management, human resource security, information systems acquisition, development and maintenance and physical and environmental security.…”
Section: Api Securitymentioning
confidence: 99%
“…Also, one common practice among software buyers and end-users is to rely on a set of security evaluation methods (e.g., ISO 17799 2005; NIST-SP800-12 1995; CC Protection Profiles 2012; M. Vieira and Madeira 2005;Mendes et al 2008) and tools (Acunetix 2012;IBM Appscan 2012;Nikto2 2015;Curphey and Arawo 2006;SecTools 2014) to help them to get an estimation of the security level of a given system based on a set of security requirements, tests, or software maturity (e.g. : is the system free from known vulnerabilities?…”
Section: Context and Motivationmentioning
confidence: 99%
“…The merit of this approach is the proposal of steps ranging from the collection of security recommendations from different sources to the proposal of tests to assess and compare the security configuration of systems. An approach proposed by (Mendes et al 2008) has applied and extended this methodology through a characterization of security practices according to the ISO 17799:2005 international standard for web servers. Additionally, (Mendes et al 2008) was not only concerned with the configuration aspects of web servers, but also with the design of a secure network and the implementation of a strong security policy.…”
Section: Security Benchmarking Initiativesmentioning
confidence: 99%
See 2 more Smart Citations