{"title":"Annotating Resources in Sequence Diagrams for Testing Web Security","authors":"Weifeng Xu, Lin Deng, Qing Zheng","doi":"10.1109/ITNG.2012.78","DOIUrl":null,"url":null,"abstract":"Both legitimate users and attackers use web resources to realize their goals. These goals are either desired or malicious in terms of the role of the users. This paper presents a novel approach for testing web security by focusing on the web resources used/exploited by both legitimate users and attackers.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"606 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Ninth International Conference on Information Technology - New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2012.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Both legitimate users and attackers use web resources to realize their goals. These goals are either desired or malicious in terms of the role of the users. This paper presents a novel approach for testing web security by focusing on the web resources used/exploited by both legitimate users and attackers.