Methods of enhancing the performance and security of web applications

Tomasz Machulski

tomaszekem2@gmail.com
Lublin University of Technology (Poland)

Grzegorz Nowakowski


Lublin University of Technology (Poland)

Maria Skublewska-Paszkowska


Lublin University of Technology (Poland)

Abstract

. This article presents the methods of enhancing the performance and security of web applications. It also evaluates them and describes how to use them. The methods have been implemented in a test application. The article presents results of the research comparing state of the application before and after implementation of every listed method. Conclusions about impact of the methods of enhancing performance and security of web applications are based on the results of the research.


Keywords:

performance of web applications; security; web-applications

[1] Qinglin Wu, Yan Wang; Performance Testing and Optimization of J2EE-based Web Applications; 2010 Second International Workshop on Education Technology and Computer Science; 2010.
[2] Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi; Web Application Security Tools Analysis; 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids); 2017.
[3] Mahesh Bang, Himanshu Saraswat; Building an effective and efficient continuous web application security program; 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016.
[4] Kirti Gupta, Manish Mathuria; Improving Performance of Web Application approaches using Connection Pooling; 2017
International conference of Electronics, Communication and Aerospace Technology (ICECA); 2017.
[5] Smith G., Wysoko wydajny PostgreSQL, Helion, 2011.
[6] Bauer C., Java Persistence: programowanie aplikacji bazodanowych w Hibernate, Helion, 2017.
[7] Hibernate Second-Level Cache | Baeldung, https://www.baeldung.com/hibernate-second-level-cache, [15.05.2019].
[8] Hibernate Cache Strategy Work, https://vladmihalcea.com/howdoes-hibernate-read_only-cacheconcurrencystrategy-work/, [12.05.2019].
[9] Hibernate. Caching, https://docs.jboss.org/hibernate/orm/4.0/devguide/enUS/html/ch06.html, [13.05.2019].
[10] Eager/Lazy Loading in Hibernate | Baeldung, https://www.baeldung.com/hibernate-lazy-eager-loading, [14.05.2019].
[11] Mak G., Rubio D., Long J., Spring. Receptury, Helion, 2014
[12] Spring. Caching, https://docs.spring.io/springboot/docs/current/reference/html/boot-features-caching.html, [14.05.2019].
[13] Spring. Paging and Sorting, https://docs.spring.io/springdata/rest/docs/2.0.0.M1/reference/html/paging-chapter.html, [15.05.2019].
[14] Lis M., Tworzenie bezpiecznych aplikacji internetowych, Helion, 2014.
[15] JSON Web Token Introduction, https://jwt.io/introduction/, [15.05.2019].
[16] Barnett R., Web Application Defender’s Cookbook: Battling Hackers and Protecting Users, Wiley, 2012.
[17] Introducing to Spring Method Security | Baeldung, https://www.baeldung.com/spring-security-method-security, [15.05.2019].
[18] The 8 HTTP Security Headers Best Practices, https://www.globaldots.com/8-http-security-headers-bestpractices/, [15.05.2019]
[19] Hope P., Walther B., Testowanie bezpieczeństwa aplikacji internetowych. Receptury, Helion, 2017
[20] Elsmari R., Navathe S., Wprowadzenie do systemów baz danych, Helion, 2019.
[21] Understanding Users, Privileges, and Roles, https://www.vertica.com/blog/understanding-users-privilegesroles/, [14.05.2019].
Download


Published
2019-09-30

Cited by

Machulski, T., Nowakowski, G., & Skublewska-Paszkowska, M. (2019). Methods of enhancing the performance and security of web applications . Journal of Computer Sciences Institute, 12, 206–213. https://doi.org/10.35784/jcsi.439

Authors

Tomasz Machulski 
tomaszekem2@gmail.com
Lublin University of Technology Poland

Authors

Grzegorz Nowakowski 

Lublin University of Technology Poland

Authors

Maria Skublewska-Paszkowska 

Lublin University of Technology Poland

Statistics

Abstract views: 449
PDF downloads: 353