Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Automation Of Authorisation Vulnerability Detection In Authenticated Web Applications, Niall Caffrey Jan 2018

Automation Of Authorisation Vulnerability Detection In Authenticated Web Applications, Niall Caffrey

Dissertations

In the beginning the World Wide Web, also known as the Internet, consisted mainly of websites. These were essentially information depositories containing static pages, with the flow of information mostly one directional, from the server to the user’s browser. Most of these websites didn’t authenticate users, instead, each user was treated the same, and presented with the same information. A malicious party that gained access to the web server hosting these websites would usually not gain access to confidential information as most of the information on the web server would already be accessible to the public. Instead, the malicious party …


An Analysis Of Software Testing Practices On Migrations From On Premise To Cloud Hosted Environments, Ronan Mullen Jan 2018

An Analysis Of Software Testing Practices On Migrations From On Premise To Cloud Hosted Environments, Ronan Mullen

Dissertations

This research project examines the differences between software testing practices that are carried out on software that is installed locally (i.e. on premise) versus software that has migrated to a cloud hosted environment. In conjunction with this, focus was placed on determining what methodologies and frameworks are in existence for assisting with software migrations to the cloud. The reason for carrying out this research project was that the transition to cloud computing is becoming more and more mainstream, as a result organisations are required to focus their efforts on how best to move their software to the cloud while ensuring …