Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications

Mohammad Ali Hadavi; Samira Sadeghi

Volume 8, Issue 1 , January 2021, , Pages 19-32

http://dx.doi.org/10.22108/jcs.2021.127261.1064

Abstract
  Cross-Site Request Forgery (CSRF) is an attack in which an infected website causes a victim's browser to perform an unwanted operation on a trusted website. The main solution to tackle ...  Read More
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

Hadi Halvachi; Mohammad Ali Hadavi; Rasool Jalili

Volume 3, Issue 2 , April 2016, , Pages 83-93

Abstract
  Although data outsourcing provides many benefits, it suffers from privacy and security concerns such as enforcement of access control policies and confidentiality of stored sensitive ...  Read More
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases

Mohammad Ali Hadavi; Rasool Jalili; Javad Ghareh Chamani

Volume 2, Issue 2 , April 2015, , Pages 87-107

Abstract
  Adoption of data outsourcing to cloud servers is hindered by data integrity issues due to the lack of trust to the servers. Existing solutions to deal with the problem often require ...  Read More
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili

Volume 1, Issue 1 , January 2014, , Pages 3-14

Abstract
  Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real ...  Read More