Acknowledgement
Supported by : Kyungpook National University
References
- Newfoundland and Labrador, Enterprise Architecture Guidelines and Best Practices, Version 3. 8, 2009.
- Desmet, L., Jacobs, B., Piessens, F., Joosen, W., "A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructure components," DistriNet Research Group, Katholieke Universiteit Leuven, Belgium, 2005.
- http://www.securityfocus.com/brief/1029, Small, medium firms cut security budgets
- Petersen, J., Benefits of using the n-tired approach for web applications, Adobe Systems Inc. http://www.adobe.com/devnet/coldfusion/articles/ntier.html, 2009.
- Shamsaie, A., Habibi, J., Ghassemi, F., Tierpeer: A three-tier framework for P2P, IJCSNS International Journal of Computer Science and Network Security, VOL. 7 No. 2, pp292-301, 2007.
- Mains, B., Introduction to 3-Tier Architecture, DotNet-Slackers.com, http://dotnetslackers.com/articles/net/IntroductionTo3-TierArchitecture.aspx, 2008.
- Thacker, N., 3-Tier Web Application Development. http://weblogs.asp.net/nannettethacker/archive/2008/03/05/3-tier-web-application-development.aspx, 2008.
- Zafar, M, F, Naheed, F, Ahmad, Z, and Anwar, M, M, Network Security: A survey of Modern approaches, The Nuclues, A Quarterly Scientific Journal of Pakistan, 2008, pp11-31.
- Lawrence, E, Newton, S., Corbit, B., Braithwaite, R., Parker, C., Technology of internet business, John Wiley & Sons Australian, Ltd, 2002, pp243-273.
- http://it.toolbox.com/wiki/index.php, Man in the Middle Attack
- Web Application Security Consortium, Web Application Security Consortium: Threat Classification, 2004, pp10-62.
- Pettit, S., "Anatomy of Web Application: Security Considerations," White Paper, Sanctum Inc., 2001.
- Meier, J. D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., Murukan, A., Web Application Security Fundamentals, Microsoft Corporation, 2003.
- Taylor, A., Alexander, D., Finch, A., Sutton, D., Information Security Management Principles, The British Computer Society, 2008.
- Viega, J., McGraw, G., Building Secure Software - How to avoid security problems the right way, Addision-Wesley, 2002.
- Satani, G., "Top 10 Web Service Security Requirements," http://builder.com.com/article.html, 2002.
- Curphey, M., Scambray, J., Olson, E., "Improving Web Application Security: Threats and Countermeasures Patterns & Practices," Microsoft Corporation, 2003.
- Curphey, M., et al., "A Guide to Building Secure Web Applications (OWASP Guide)," Creative Commons Attribution ShareAlike 3.0, 2002.
- White Hat Security, "Web Application Security 101: Real-world examples, tools and techniques for securing websites," White Paper, White Hat Security, Inc, 2005.
- The Apache Tomcat, http://tomcat.apache.org/
- MySQL Database Server 5.1.36, http://download.cnet.com/MySQL-Database-Server/
- Open SSL, http://www.openssl.org/
- OpenVPN, http://www.openvpn.net/
- ModSecurity, http://www.techiecorner.com/
- pfSense firewall, http://www.linux.com/
- Cheliotis, G, From open source to open content: Organization, licensing and decision processes in open cultural production, Decision Support Systems Volume 47, Issue 3, Elsevier Ltd, 2009, pp229-244. https://doi.org/10.1016/j.dss.2009.02.006
- Forte, D, SSL VPN and return on investment: A possible combination, Network Security, Volume 2009, Issue 10, Elsevier Ltd, 2009, pp17-19. https://doi.org/10.1016/S1353-4858(09)70112-6
- Bock, J, Session-Cookies and SSL, study research project at the EISS, University of Karlsruhe, 2008.