Methods of enhancing the performance and security of web applications
Tomasz Machulski
tomaszekem2@gmail.comLublin University of Technology (Poland)
Grzegorz Nowakowski
Lublin University of Technology (Poland)
Maria Skublewska-Paszkowska
Lublin University of Technology (Poland)
Abstract
. This article presents the methods of enhancing the performance and security of web applications. It also evaluates them and describes how to use them. The methods have been implemented in a test application. The article presents results of the research comparing state of the application before and after implementation of every listed method. Conclusions about impact of the methods of enhancing performance and security of web applications are based on the results of the research.
Keywords:
performance of web applications; security; web-applicationsReferences
[1] Qinglin Wu, Yan Wang; Performance Testing and Optimization of J2EE-based Web Applications; 2010 Second International Workshop on Education Technology and Computer Science; 2010.
[2] Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi; Web Application Security Tools Analysis; 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids); 2017.
[3] Mahesh Bang, Himanshu Saraswat; Building an effective and efficient continuous web application security program; 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016.
[4] Kirti Gupta, Manish Mathuria; Improving Performance of Web Application approaches using Connection Pooling; 2017
International conference of Electronics, Communication and Aerospace Technology (ICECA); 2017.
[5] Smith G., Wysoko wydajny PostgreSQL, Helion, 2011.
[6] Bauer C., Java Persistence: programowanie aplikacji bazodanowych w Hibernate, Helion, 2017.
[7] Hibernate Second-Level Cache | Baeldung, https://www.baeldung.com/hibernate-second-level-cache, [15.05.2019].
[8] Hibernate Cache Strategy Work, https://vladmihalcea.com/howdoes-hibernate-read_only-cacheconcurrencystrategy-work/, [12.05.2019].
[9] Hibernate. Caching, https://docs.jboss.org/hibernate/orm/4.0/devguide/enUS/html/ch06.html, [13.05.2019].
[10] Eager/Lazy Loading in Hibernate | Baeldung, https://www.baeldung.com/hibernate-lazy-eager-loading, [14.05.2019].
[11] Mak G., Rubio D., Long J., Spring. Receptury, Helion, 2014
[12] Spring. Caching, https://docs.spring.io/springboot/docs/current/reference/html/boot-features-caching.html, [14.05.2019].
[13] Spring. Paging and Sorting, https://docs.spring.io/springdata/rest/docs/2.0.0.M1/reference/html/paging-chapter.html, [15.05.2019].
[14] Lis M., Tworzenie bezpiecznych aplikacji internetowych, Helion, 2014.
[15] JSON Web Token Introduction, https://jwt.io/introduction/, [15.05.2019].
[16] Barnett R., Web Application Defender’s Cookbook: Battling Hackers and Protecting Users, Wiley, 2012.
[17] Introducing to Spring Method Security | Baeldung, https://www.baeldung.com/spring-security-method-security, [15.05.2019].
[18] The 8 HTTP Security Headers Best Practices, https://www.globaldots.com/8-http-security-headers-bestpractices/, [15.05.2019]
[19] Hope P., Walther B., Testowanie bezpieczeństwa aplikacji internetowych. Receptury, Helion, 2017
[20] Elsmari R., Navathe S., Wprowadzenie do systemów baz danych, Helion, 2019.
[21] Understanding Users, Privileges, and Roles, https://www.vertica.com/blog/understanding-users-privilegesroles/, [14.05.2019].
[2] Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi; Web Application Security Tools Analysis; 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids); 2017.
[3] Mahesh Bang, Himanshu Saraswat; Building an effective and efficient continuous web application security program; 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016.
[4] Kirti Gupta, Manish Mathuria; Improving Performance of Web Application approaches using Connection Pooling; 2017
International conference of Electronics, Communication and Aerospace Technology (ICECA); 2017.
[5] Smith G., Wysoko wydajny PostgreSQL, Helion, 2011.
[6] Bauer C., Java Persistence: programowanie aplikacji bazodanowych w Hibernate, Helion, 2017.
[7] Hibernate Second-Level Cache | Baeldung, https://www.baeldung.com/hibernate-second-level-cache, [15.05.2019].
[8] Hibernate Cache Strategy Work, https://vladmihalcea.com/howdoes-hibernate-read_only-cacheconcurrencystrategy-work/, [12.05.2019].
[9] Hibernate. Caching, https://docs.jboss.org/hibernate/orm/4.0/devguide/enUS/html/ch06.html, [13.05.2019].
[10] Eager/Lazy Loading in Hibernate | Baeldung, https://www.baeldung.com/hibernate-lazy-eager-loading, [14.05.2019].
[11] Mak G., Rubio D., Long J., Spring. Receptury, Helion, 2014
[12] Spring. Caching, https://docs.spring.io/springboot/docs/current/reference/html/boot-features-caching.html, [14.05.2019].
[13] Spring. Paging and Sorting, https://docs.spring.io/springdata/rest/docs/2.0.0.M1/reference/html/paging-chapter.html, [15.05.2019].
[14] Lis M., Tworzenie bezpiecznych aplikacji internetowych, Helion, 2014.
[15] JSON Web Token Introduction, https://jwt.io/introduction/, [15.05.2019].
[16] Barnett R., Web Application Defender’s Cookbook: Battling Hackers and Protecting Users, Wiley, 2012.
[17] Introducing to Spring Method Security | Baeldung, https://www.baeldung.com/spring-security-method-security, [15.05.2019].
[18] The 8 HTTP Security Headers Best Practices, https://www.globaldots.com/8-http-security-headers-bestpractices/, [15.05.2019]
[19] Hope P., Walther B., Testowanie bezpieczeństwa aplikacji internetowych. Receptury, Helion, 2017
[20] Elsmari R., Navathe S., Wprowadzenie do systemów baz danych, Helion, 2019.
[21] Understanding Users, Privileges, and Roles, https://www.vertica.com/blog/understanding-users-privilegesroles/, [14.05.2019].
Machulski, T., Nowakowski, G., & Skublewska-Paszkowska, M. (2019). Methods of enhancing the performance and security of web applications . Journal of Computer Sciences Institute, 12, 206–213. https://doi.org/10.35784/jcsi.439
Authors
Grzegorz NowakowskiLublin University of Technology Poland
Authors
Maria Skublewska-PaszkowskaLublin University of Technology Poland
Statistics
Abstract views: 449PDF downloads: 353
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.