About the Journal

Web applications are computer programs that use web browsers and web technology to perform tasks over the Internet. Millions of businesses use the Internet as an economical communication channel. This allows them to exchange information with their target market and perform transactions quickly and securely. This allows users to interact with the company using online forms, content management systems, shopping carts and more. In addition, the app allows employees to create documents, share information, collaborate on projects, and work on common documents regardless of location or device. However, the security of the information is guaranteed during the transaction, therefore web security is required. Web security is also known as "Cybersecurity". This basically means protecting a website or web application by detecting, preventing and responding to cyber threats. Websites and web applications are vulnerable to security breaches such as physical homes, stores, and government locations. Unfortunately, cybercrime happens every day, and great web security measures are needed to protect websites and web applications from being compromised.

That is why there is a need for more research into applications and web security. therefore this index book aims to collect web security related. this is to improve a system of protection measures and protocols that can protect your website or web application from being hacked or entered by unauthorized personnel. This important piece of information security is very important for the protection of websites, web applications, and web services. Anything applied over the Internet should have some form of web security to protect it.

 

Scope

These book addresses web application and security for web topics including

  • Storage for Web-scale applications
  • Techniques for testing and debugging
  • Novel strategies for fault tolerance or high availability in Web apps
  • The Web as an emerging platform in new application areas
  • Making Web apps social and integrating with social utilities, e.g., Facebook, Twitter, Google+, and others
  • experimental research on Web apps
  • New and unusual app features or implementation techniques
  • Deployment substrates and technologies (cloud computing, infrastructure as a service, testing as a service, etc.)
  • Privacy and Authentication
  • Key Management
  • Authentication
  • Trust Management
  • Computational Intelligence in Security
  • Fuzzy Systems
  • Trust Models and Metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Security and Privacy in Mobile Systems