[PDF][PDF] Evolution of PHP applications: A systematic literature review

A Siame, D Kunda - International Journal of Recent Contributions from …, 2017 - core.ac.uk
This paper reviews, some of the research work done in the evolution of PHP applications
that have been around and are vastly used. PHP is currently one of the most popular …

Extraction and comprehension of moodle's access control model: A case study

F Gauthier, D Letarte, T Lavoie… - 2011 Ninth Annual …, 2011 - ieeexplore.ieee.org
Whether for development, maintenance or refactoring, multiple steps in software
development cycle require comprehension of a program's access control model (AC model) …

Detection of protection-impacting changes during software evolution

MA Laverdière, E Merlo - 2018 IEEE 25th International …, 2018 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is often used in web applications to restrict operations
and protect security sensitive information and resources. Web applications regularly …

RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications

MA Laverdière, K Julien, E Merlo - Information and Software Technology, 2021 - Elsevier
Abstract: Web applications often use Role-Based Access Control (RBAC) to restrict
operations and protect security sensitive information and resources. Context: Web …

Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)

MA Laverdière, E Merlo - … on Privacy, Security and Trust (PST), 2017 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is commonly used in web applications to protect
information and restrict operations. Their security may be affected by source code changes …

Computing counter-examples for privilege protection losses using security models

MA Laverdière, E Merlo - 2017 IEEE 24th International …, 2017 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is commonly used in web applications to protect
information and restrict operations. Code changes may affect the security of the application …

[BOK][B] Just-in-time detection of protection-impacting changes on WordPress and MediaWiki

MA Barrak - 2018 - search.proquest.com
Access control mechanisms based on roles and privileges restrict the access of users to
security sensitive resources in a multi-user software system. Unintentional privilege …

Pengembangan sistem informasi manajemen jemaat gereja berbasis website dengan metode rapid application development (rad) menggunakan framework laravel

MS Mulyono - 2022 - repository.unika.ac.id
Gereja merupakan sebuah organisasi nirlaba yang berfokus pada pelayanan masyarakat
khususnya di bidang keagamaan (Kristen). Sebagai sebuah organisasi, tentunya gereja …

[BOK][B] Finding differences in privilege protection and their origin in role-based access control implementations

MA Laverdière-Papineau - 2018 - search.proquest.com
Web applications are commonplace, and have security needs. One of these is access
control. Access control enforces a security policy that allows and restricts access to …

Research on PHP agile development framework

K Tian, CW Wang - Advanced Materials Research, 2013 - Trans Tech Publ
After analysis and comparison on the existing PHP frameworks, a PHP Agile development
framework based on the MVC pattern has been proposed which is simple, efficient, and …