2013 International Conference on Intelligent Systems and Signal Processing (ISSP) 2013
DOI: 10.1109/issp.2013.6526932
|View full text |Cite
|
Sign up to set email alerts
|

Comparative analysis of web security in open source content management system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 2 publications
0
9
0
2
Order By: Relevance
“…W trakcie przeszukiwania zbioru pozycji literaturowych odnaleziono prace traktujące o bezpieczeństwie systemów typu CMS [3,4,5,6]. Okazało się, że praca Comparative Analysis Of Web Security In Open Source Content Management System [3] porusza tą samą tematykę co niniejsza praca, z tym że autorzy porównywali jeszcze platformę Drupal.…”
Section: Przegląd Literaturyunclassified
“…W trakcie przeszukiwania zbioru pozycji literaturowych odnaleziono prace traktujące o bezpieczeństwie systemów typu CMS [3,4,5,6]. Okazało się, że praca Comparative Analysis Of Web Security In Open Source Content Management System [3] porusza tą samą tematykę co niniejsza praca, z tym że autorzy porównywali jeszcze platformę Drupal.…”
Section: Przegląd Literaturyunclassified
“…Patel and associates describe the life cycle of content in their work and how at every stage of this cycle, security at each level can be improved. All of these challenges are largely solved by means of various add-ons that compensate for the existing failures in the systems and, by their application, these systems seem to be much safer [18].…”
Section: Previous Research and Their Justificationmentioning
confidence: 99%
“…More related to the work presented here in this paper is the background literature that have attempted to scan services with specific tools with the goal of discovering vulnerabilities within these services and propose means by which such flaws could be avoided in the future. Examples of such work are seen in [13][14][15]. In [13], the authors present a case study that covers penetration testing of a single target application.…”
Section: Research Backgroundmentioning
confidence: 99%
“…This is achieved by means of tools and static code analysis. In [14], instead of targeting a single platform and auditing it for multiple vulnerabilities, a single vulnerability, SQLi, is selected and a tool is developed towards its detection. A case study is presented towards an evaluation of the security achieved by multiple open source CMS.…”
Section: Research Backgroundmentioning
confidence: 99%