{"id":"https://openalex.org/W2161350934","doi":"https://doi.org/10.1109/emeit.2011.6023568","title":"A conceptual model for preventing web bypass vulnerabilities","display_name":"A conceptual model for preventing web bypass vulnerabilities","publication_year":2011,"publication_date":"2011-08-01","ids":{"openalex":"https://openalex.org/W2161350934","doi":"https://doi.org/10.1109/emeit.2011.6023568","mag":"2161350934"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/emeit.2011.6023568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079932099","display_name":"Zhiqiang Wei","orcid":"https://orcid.org/0000-0002-2830-8301"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Wei","raw_affiliation_strings":["Department of Computer Science, Ocean University of China, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ocean University of China, Qingdao, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055748355","display_name":"Kai Shi","orcid":"https://orcid.org/0000-0002-9371-5405"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiyuan Shi","raw_affiliation_strings":["Department of Computer Science, Ocean University of China, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ocean University of China, Qingdao, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102749238","display_name":"Dongning Jia","orcid":"https://orcid.org/0000-0003-1514-208X"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongning Jia","raw_affiliation_strings":["Department of Computer Science, Ocean University of China, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ocean University of China, Qingdao, China","institution_ids":["https://openalex.org/I59028903"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":65},"biblio":{"volume":null,"issue":null,"first_page":"2287","last_page":"2290"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.532413}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8376302},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6536023},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.61148846},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.58132446},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.532413},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.5079115},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42837796},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.41105685},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08736557}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/emeit.2011.6023568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.76,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":5,"referenced_works":["https://openalex.org/W1511560695","https://openalex.org/W1587010340","https://openalex.org/W2001593152","https://openalex.org/W2056073317","https://openalex.org/W2161688581"],"related_works":["https://openalex.org/W819284483","https://openalex.org/W2945232779","https://openalex.org/W2392979115","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2374393728","https://openalex.org/W2372156812","https://openalex.org/W2356011375","https://openalex.org/W2148952798","https://openalex.org/W1795360416"],"abstract_inverted_index":{"This":[0],"paper":[1,126],"provides":[2],"a":[3,32],"conceptual":[4],"model":[5,122,140],"for":[6,41],"reducing":[7],"bypass":[8,20],"vulnerabilities":[9,21],"in":[10,73,124],"web":[11,33,76,87],"applications.":[12],"The":[13],"typical":[14],"and":[15,24,38,70,81,83,134],"primary":[16],"two":[17],"kinds":[18],"of":[19,85,113],"are":[22,66,157],"authentication":[23,142],"access":[25,40,51,60,146,159],"control":[26,47,52,147],"vulnerabilities.":[27],"Authentication":[28],"attacks":[29,48,65,99],"occur":[30],"when":[31,50,130],"application":[34,132],"authenticates":[35,136],"users":[36,42,156],"incorrectly":[37],"grants":[39],"without":[43],"appropriate":[44],"credentials.":[45],"Access":[46],"happen":[49],"check":[53],"is":[54],"incorrect":[55],"or":[56,94,163],"missing,":[57],"allowing":[58],"unauthorized":[59],"to":[61,109,149,160],"privileged":[62,161],"resources.":[63],"Such":[64],"getting":[67],"increasingly":[68],"common":[69],"have":[71],"occurred":[72],"many":[74],"famous":[75],"applications":[77],"such":[78],"as":[79],"IIS":[80],"WordPress,":[82],"14%":[84],"surveyed":[86],"sites.":[88],"However,":[89],"currently":[90],"no":[91],"available":[92],"tools":[93],"methods":[95],"can":[96,127],"prevent":[97],"these":[98],"efficiently.":[100],"By":[101],"using":[102],"Dynamic":[103],"Information":[104],"Flow":[105],"Tracking":[106],"(DIFT)":[107],"techniques":[108],"track":[110],"the":[111,117,121,139],"flow":[112],"user":[114],"credentials":[115],"through":[116],"application's":[118],"language":[119],"runtime,":[120],"presented":[123],"this":[125],"automatically":[128,150],"detect":[129],"an":[131],"safely":[133],"correctly":[135],"users.":[137],"Then":[138],"combines":[141],"information":[143],"with":[144],"programmer-supplied":[145],"rules":[148],"ensure":[151],"that":[152],"only":[153],"properly":[154],"authenticated":[155],"granted":[158],"resources":[162],"data.":[164]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2161350934","counts_by_year":[],"updated_date":"2025-01-19T16:59:38.983996","created_date":"2016-06-24"}