Methods of enhancing the performance and security of web applications
Article Sidebar
Open full text
Published:
Sep 30, 2019
Issue Vol. 12 (2019)
Articles
-
Hybrid methods of working with databases in JEE applications
Katarzyna Jóźwicka, Mariusz Mitrus167-171
-
Tools to support user interface design web applications - comparative analysis
Paweł Serafin, Marek Miłosz172-178
-
Analysis of possibility of virtual reality usage for investigating reaction on given conditions
Marcin Łukasiak, Kamil Machul, Mateusz Maj179-186
-
The analysis of the influence of a graphical user interface's design on the number and time of website visits
Izabela Wasyluk, Grzegorz Kozieł187-192
-
Storage efficiency comparison of UML models in selected database technologies
Andrii Filatov, Paweł Flis, Beata Pańczyk193-198
-
Methods for recognizing mushroom species on the basis of the photo
Kamil Chodoła, Grzegorz Czyż, Maria Skublewska-Paszkowska199-205
-
Methods of enhancing the performance and security of web applications
Tomasz Machulski, Grzegorz Nowakowski, Maria Skublewska-Paszkowska206-213
-
Comparison of virtualization performance of Proxmox, OpenVZ, OpenNebula, Vmware ESX and Xen Server
Grzegorz Rycaj214-219
-
Analysis of the impact of technologies and methods of hologram transmission on the parameters and effects of transmission
Krzysztof Mazur, Damian Mazur220-225
-
Analysis of the possibility of shortening the time of creating a mobile application for Android and iOS systems using Xamarin technology
Daniel Molenda, Maria Skublewska-Paszkowska226-231
-
Own system of intelligent building in comparison with an open - source solution
Cezary Kryczka232-239
-
Comparative Analysis of High Availability Solutions
Michał Sylwester Borsewicz, Daniel Bieniek240-245
-
Analysis of the development Android’s runtime
Kostiantyn Honcharenko, Jakub Smołka246-251
-
Analysis and evaluation of tools supporting group work in the cloud
Paweł Gustaw, Elżbieta Miłosz252-257
-
Analysis of the application possibilities of IoT technology in smart home systems
Arkadiusz Bęben, Piotr Kopniak258-266
Main Article Content
DOI
Authors
Tomasz Machulski
Lublin University of Technology, Poland
Grzegorz Nowakowski
grzegorz.nowakowski@pollub.edu.pl
Lublin University of Technology, Poland
Maria Skublewska-Paszkowska
Lublin University of Technology, Poland
Abstract
. This article presents the methods of enhancing the performance and security of web applications. It also evaluates them and describes how to use them. The methods have been implemented in a test application. The article presents results of the research comparing state of the application before and after implementation of every listed method. Conclusions about impact of the methods of enhancing performance and security of web applications are based on the results of the research.
Keywords:
performance of web applications; security; web-applications
References
[1] Qinglin Wu, Yan Wang; Performance Testing and Optimization of J2EE-based Web Applications; 2010 Second International Workshop on Education Technology and Computer Science; 2010.
[2] Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi; Web Application Security Tools Analysis; 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids); 2017.
[3] Mahesh Bang, Himanshu Saraswat; Building an effective and efficient continuous web application security program; 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016.
[4] Kirti Gupta, Manish Mathuria; Improving Performance of Web Application approaches using Connection Pooling; 2017
International conference of Electronics, Communication and Aerospace Technology (ICECA); 2017.
[5] Smith G., Wysoko wydajny PostgreSQL, Helion, 2011.
[6] Bauer C., Java Persistence: programowanie aplikacji bazodanowych w Hibernate, Helion, 2017.
[7] Hibernate Second-Level Cache | Baeldung, https://www.baeldung.com/hibernate-second-level-cache, [15.05.2019].
[8] Hibernate Cache Strategy Work, https://vladmihalcea.com/howdoes-hibernate-read_only-cacheconcurrencystrategy-work/, [12.05.2019].
[9] Hibernate. Caching, https://docs.jboss.org/hibernate/orm/4.0/devguide/enUS/html/ch06.html, [13.05.2019].
[10] Eager/Lazy Loading in Hibernate | Baeldung, https://www.baeldung.com/hibernate-lazy-eager-loading, [14.05.2019].
[11] Mak G., Rubio D., Long J., Spring. Receptury, Helion, 2014
[12] Spring. Caching, https://docs.spring.io/springboot/docs/current/reference/html/boot-features-caching.html, [14.05.2019].
[13] Spring. Paging and Sorting, https://docs.spring.io/springdata/rest/docs/2.0.0.M1/reference/html/paging-chapter.html, [15.05.2019].
[14] Lis M., Tworzenie bezpiecznych aplikacji internetowych, Helion, 2014.
[15] JSON Web Token Introduction, https://jwt.io/introduction/, [15.05.2019].
[16] Barnett R., Web Application Defender’s Cookbook: Battling Hackers and Protecting Users, Wiley, 2012.
[17] Introducing to Spring Method Security | Baeldung, https://www.baeldung.com/spring-security-method-security, [15.05.2019].
[18] The 8 HTTP Security Headers Best Practices, https://www.globaldots.com/8-http-security-headers-bestpractices/, [15.05.2019]
[19] Hope P., Walther B., Testowanie bezpieczeństwa aplikacji internetowych. Receptury, Helion, 2017
[20] Elsmari R., Navathe S., Wprowadzenie do systemów baz danych, Helion, 2019.
[21] Understanding Users, Privileges, and Roles, https://www.vertica.com/blog/understanding-users-privilegesroles/, [14.05.2019].
[2] Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi; Web Application Security Tools Analysis; 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids); 2017.
[3] Mahesh Bang, Himanshu Saraswat; Building an effective and efficient continuous web application security program; 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016.
[4] Kirti Gupta, Manish Mathuria; Improving Performance of Web Application approaches using Connection Pooling; 2017
International conference of Electronics, Communication and Aerospace Technology (ICECA); 2017.
[5] Smith G., Wysoko wydajny PostgreSQL, Helion, 2011.
[6] Bauer C., Java Persistence: programowanie aplikacji bazodanowych w Hibernate, Helion, 2017.
[7] Hibernate Second-Level Cache | Baeldung, https://www.baeldung.com/hibernate-second-level-cache, [15.05.2019].
[8] Hibernate Cache Strategy Work, https://vladmihalcea.com/howdoes-hibernate-read_only-cacheconcurrencystrategy-work/, [12.05.2019].
[9] Hibernate. Caching, https://docs.jboss.org/hibernate/orm/4.0/devguide/enUS/html/ch06.html, [13.05.2019].
[10] Eager/Lazy Loading in Hibernate | Baeldung, https://www.baeldung.com/hibernate-lazy-eager-loading, [14.05.2019].
[11] Mak G., Rubio D., Long J., Spring. Receptury, Helion, 2014
[12] Spring. Caching, https://docs.spring.io/springboot/docs/current/reference/html/boot-features-caching.html, [14.05.2019].
[13] Spring. Paging and Sorting, https://docs.spring.io/springdata/rest/docs/2.0.0.M1/reference/html/paging-chapter.html, [15.05.2019].
[14] Lis M., Tworzenie bezpiecznych aplikacji internetowych, Helion, 2014.
[15] JSON Web Token Introduction, https://jwt.io/introduction/, [15.05.2019].
[16] Barnett R., Web Application Defender’s Cookbook: Battling Hackers and Protecting Users, Wiley, 2012.
[17] Introducing to Spring Method Security | Baeldung, https://www.baeldung.com/spring-security-method-security, [15.05.2019].
[18] The 8 HTTP Security Headers Best Practices, https://www.globaldots.com/8-http-security-headers-bestpractices/, [15.05.2019]
[19] Hope P., Walther B., Testowanie bezpieczeństwa aplikacji internetowych. Receptury, Helion, 2017
[20] Elsmari R., Navathe S., Wprowadzenie do systemów baz danych, Helion, 2019.
[21] Understanding Users, Privileges, and Roles, https://www.vertica.com/blog/understanding-users-privilegesroles/, [14.05.2019].
Article Details
Machulski, T., Nowakowski, G., & Skublewska-Paszkowska, M. (2019). Methods of enhancing the performance and security of web applications . Journal of Computer Sciences Institute, 12, 206–213. https://doi.org/10.35784/jcsi.439
Abstract views: 517
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
