A Defense against SQL Injection Attack through Validation on Input Legitimacy
碩士 === 中原大學 === 資訊工程研究所 === 97 === The development of Web 2.0 brings in the prevalence of web application services based on database support. Along with the increasing interaction with database, web application service programs become complicate, which makes it difficult to guarantee that SQL query...
Main Authors: | Ching-Ju Wu, 吳靜茹 |
---|---|
Other Authors: | Hsiao-Rong Tyan |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/44317375982863901114 |
Similar Items
-
A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy
by: An-Na Lee, et al.
Published: (2011) -
A Defense against Stored Procedure Compositional SQL Injection Attack through Validation on Input Legitimacy
by: Wei-Lin Chen, et al.
Published: (2013) -
Exploring Defense of SQL Injection Attack in Penetration Testing
by: Zhu, Yao Chu
Published: (2016) -
TransSQL: A Translation and Validation-based Solution for SQL-Injection Attacks
by: Hao-lun Huang, et al.
Published: (2010) -
Preventing SQL Injection Attacks Using the Field Attributes of User Input
by: Lai, Shu Mei, et al.
Published: (2009)