Enter your keyword

2-s2.0-85099530540

[vc_empty_space][vc_empty_space]

HTTPS contribution in web application security: A systematic literature review

Wijitrisnanto F.a, Suhardia, Yustianto P.b

a Institut Teknologi Bandung, School of Electrical Engineering and Informatics, Bandung, Indonesia
b Dinas Komunikasi Dan Informatika Jawa Barat, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2020 IEEE.A Web application is one of the most used technology nowadays due to its flexibility in delivering services to society. It also plays a good portion in enhancing our daily life since it could provide almost any kind of services through an application served from the internet. Thus, many users’ private information runs the risk of being exposed to an unauthorized party. Standard browser connection uses HTTPS protocol, while both TLS over HTTP and Web application are known for several of vulnerabilities. This paper presents the results of an SLR study on web application security of HTTPS implementation. The study selects 45 qualified papers related to the topic and analyzed 24 of the documents. The findings are categorized into three labels: threats, threats impact, and defense mechanisms. This work also classifies the attack and threats based on the impact produced. In this study, the lack of understanding about security-related mechanism in TLS, session management, and web application still become the culprit of most attack and vulnerability. Based on this work, a researcher could better prioritize and prepare security mechanism to overcome the threats.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Daily lives,Defense mechanism,Private information,Security mechanism,Session management,Systematic literature review,WEB application,Web application security[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Cookie,Csp,Hpkp,Hsts,Https,Security,Systematic literature review,Tls,Web application[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI50517.2020.9264971[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]