31
Views
0
CrossRef citations to date
0
Altmetric
Review article

A Case Study of Cyber Subversion Attack based Design Flaw in Service Oriented Component Application Logic

ORCID Icon, , &
Received 22 Aug 2023, Accepted 17 Sep 2023, Published online: 09 Oct 2023

References

  • Ghosh AK. Security & privacy for e-business. ISBN 0-471-384211-6: John Wiley & Sons; 2001.
  • Nabi F, Yong J. Xiaohui Tao: A novel approach for component based application logic event attack modeling. Int J Netw Secur. 2020;22(3):435–441.
  • Nabi F. Designing a framework method for secure. Business application logic integrity in e-commerce systems. Int J Netw Secur. 2011 Jan;12(1):29–41.
  • Ritchie P. The security risks of Ajax/web 2.0 application. Network Security: Elsevier; 2007.
  • Offutt J. Quality attributes of web software applications. IEEE software. March-April 2002;19(2):25–32. doi:10.1109/52.991329
  • Nabi F, Yong J, Tao X. Xiaohui Tao: classification of logical vulnerability based on group attack method. J Ubiquitous Syst Pervasive Networks. 2021;14(1):19–26. doi:10.5383/JUSPN.14.01.004
  • Agirre A, Parra J, Armentia A, et al. QoS aware middleware support for dynamically reconfigurable component based IoT applications. Int J Distrib Sens Netw. 2016;12(4):2702789. doi: 10.1155/2016/2702789
  • Allan D, Web application security; automated scanning or manual penetration testing, watch paper from watch fire, 2006.
  • McGraw G. Software security: building security in. Boston, MA:Addison-Wesley; 2006. Available from: http://www.buildingsecurityin.com.
  • Zhang H, A formal security modeling and analysis in B2B e-commerce, [ PhD thesis], Auckland University, 2006.
  • Jones A, Ashenden D. Risk management for Computer security: protecting your network & information assets. Elsevier; 2005 March.
  • Rodríguez M, Zalama E, González I. Integración automática de dispositivos en el Hogar Digital a través de la generación de adaptadores dirigida por modelos. Revista Iberoamericana de Automática e Informática Industrial RIAI. 2016;13(3):363–369. doi: 10.1016/j.riai.2016.03.007
  • Agirre A, Armentia A, Estévez E, et al. A component-based approach for securing indoor home care applications. Sensors. 2018;18(2):46. doi: 10.3390/s18010046
  • Singh K. Quantitative social research methods. SAGE Publications India Pvt Ltd; 2007. p. 64. doi: 10.4135/9789351507741
  • Streb CK. Encyclopaedia of case study research. ISBN: 9781412956703. SAGE Publications, Inc, Print; 2012. pp. 1–10.
  • Malohlava M, Hnetynka P, Bures T. SOFA 2 component framework and its ecosystem. Electron. Notes Theor Comput Sci. 2013;295:101–106. doi: 10.1016/j.entcs.2013.04.009
  • Nabi F. Secure business application logic for e-commerce systems. Elsevier J Comput Secur. 2005;24(3):208–217. doi: 10.1016/j.cose.2004.08.008
  • Agirre A, Marcos M, Estevez E Distributed applications management platform based on service component architecture. In Proceedings of the 17th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Krakow, Poland, 17–21 September 2012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.