Proceedings of the Fifth Cybersecurity Symposium 2018
DOI: 10.1145/3212687.3212863
|View full text |Cite
|
Sign up to set email alerts
|

Hardening web applications using a least privilege DBMS access model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The principle of least privilege (PoLP) (Steiner et al, 2018) is a fundamental tenet in access control within the Metaverse. Its essence lies in granting users only the minimal privileges required to fulfill their authorized tasks.…”
Section: Principle Of Least Privilegementioning
confidence: 99%
“…The principle of least privilege (PoLP) (Steiner et al, 2018) is a fundamental tenet in access control within the Metaverse. Its essence lies in granting users only the minimal privileges required to fulfill their authorized tasks.…”
Section: Principle Of Least Privilegementioning
confidence: 99%
“…In classifying the model, the dataset used is a server access log file consisting of normal access logs, SQL injection attack logs, XSS attack logs, and Denial of Service (DOS) attack logs against DVWA applications. Steiner S, de Leon D, and Jillepalli A [19] use Multillidae vulnerable web application as a study case for developing a non-least privilege security model for its DBMS database permissions. Alazmi S and De Leon D [20] benchmarked 30 web vulnerability scanners towards OWASP Web Security 2010, 2013, 2017, and 2021.…”
Section: Related Workmentioning
confidence: 99%