Methods of enhancing the performance and security of web applications


Abstract

. This article presents the methods of enhancing the performance and security of web applications. It also evaluates them and describes how to use them. The methods have been implemented in a test application. The article presents results of the research comparing state of the application before and after implementation of every listed method. Conclusions about impact of the methods of enhancing performance and security of web applications are based on the results of the research.


Keywords

performance of web applications; security; web-applications

[1] Qinglin Wu, Yan Wang; Performance Testing and Optimization of J2EE-based Web Applications; 2010 Second International Workshop on Education Technology and Computer Science; 2010.
[2] Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi; Web Application Security Tools Analysis; 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids); 2017.
[3] Mahesh Bang, Himanshu Saraswat; Building an effective and efficient continuous web application security program; 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016.
[4] Kirti Gupta, Manish Mathuria; Improving Performance of Web Application approaches using Connection Pooling; 2017
International conference of Electronics, Communication and Aerospace Technology (ICECA); 2017.
[5] Smith G., Wysoko wydajny PostgreSQL, Helion, 2011.
[6] Bauer C., Java Persistence: programowanie aplikacji bazodanowych w Hibernate, Helion, 2017.
[7] Hibernate Second-Level Cache | Baeldung, https://www.baeldung.com/hibernate-second-level-cache, [15.05.2019].
[8] Hibernate Cache Strategy Work, https://vladmihalcea.com/howdoes-hibernate-read_only-cacheconcurrencystrategy-work/, [12.05.2019].
[9] Hibernate. Caching, https://docs.jboss.org/hibernate/orm/4.0/devguide/enUS/html/ch06.html, [13.05.2019].
[10] Eager/Lazy Loading in Hibernate | Baeldung, https://www.baeldung.com/hibernate-lazy-eager-loading, [14.05.2019].
[11] Mak G., Rubio D., Long J., Spring. Receptury, Helion, 2014
[12] Spring. Caching, https://docs.spring.io/springboot/docs/current/reference/html/boot-features-caching.html, [14.05.2019].
[13] Spring. Paging and Sorting, https://docs.spring.io/springdata/rest/docs/2.0.0.M1/reference/html/paging-chapter.html, [15.05.2019].
[14] Lis M., Tworzenie bezpiecznych aplikacji internetowych, Helion, 2014.
[15] JSON Web Token Introduction, https://jwt.io/introduction/, [15.05.2019].
[16] Barnett R., Web Application Defender’s Cookbook: Battling Hackers and Protecting Users, Wiley, 2012.
[17] Introducing to Spring Method Security | Baeldung, https://www.baeldung.com/spring-security-method-security, [15.05.2019].
[18] The 8 HTTP Security Headers Best Practices, https://www.globaldots.com/8-http-security-headers-bestpractices/, [15.05.2019]
[19] Hope P., Walther B., Testowanie bezpieczeństwa aplikacji internetowych. Receptury, Helion, 2017
[20] Elsmari R., Navathe S., Wprowadzenie do systemów baz danych, Helion, 2019.
[21] Understanding Users, Privileges, and Roles, https://www.vertica.com/blog/understanding-users-privilegesroles/, [14.05.2019].
Download

Published : 2019-09-30


Machulski, T., Nowakowski, G., & Skublewska-Paszkowska, M. (2019). Methods of enhancing the performance and security of web applications . Journal of Computer Sciences Institute, 12, 206-213. https://doi.org/10.35784/jcsi.439

Tomasz Machulski  tomaszekem2@gmail.com
Lublin University of Technology  Poland
Grzegorz Nowakowski 
Lublin University of Technology  Poland
Maria Skublewska-Paszkowska 
Lublin University of Technology  Poland