z-logo
open-access-imgOpen Access
Analysis on Web Frameworks
Author(s) -
Dasari Hermitha Curie,
Joyce Jaison,
Jyoti Yadav,
J. Rex Fiona
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1362/1/012114
Subject(s) - computer science , world wide web , web application , web application security , programmer , web server , web development , application server , computer security , web page , the internet , operating system
while creating a website choosing the best framework for the required application is the most important step. Since there are different types of frameworks it is not an easy task. Besides, if the wrong framework is chosen it could negatively impact the website. With the evolution of the web many frameworks like PHP, Java servlets, struts, Stencil, Rebel, Ruby on rails, Flask and Falcon have been developed. Large amounts of personal information and data are being sent and recovered on a daily basis from web applications. Every application contains confidential information and therefore has its own integrity policies. There can be a huge negative impact on the financial status of the company involved, if these policies are violated. Although, implementing them is very difficult even for the programmer’s with good security framework. The environment of the web consists of a huge number of different technologies and components; therefore, web applications have an extraordinary surface of attack. Security defects stored in web browser may expose authentication details and sensitive information stored in the website. This may breach the integrity and confidentiality of the session and errors in the code may lead to the addition of destructive contents in the web pages. Complex elements such as databases, operating systems, firewalls, servers and other software’s functioning of a web application. But for it to run properly, persistent maintenance and configuration is required. Injection attacks normally takes control over the websites database by data injection into the application. In this paper we discuss about different Frameworks, its types, benefits, the security provided and its challenges. We have also compared five of the leading frameworks in aspects of complexity and security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here