Paper Title | |
Authors | Publication Year |
Source | Evaluator |
Assessment of Quality | 1 0 −1 |
WAS risk evaluation is provided in detail in the study? |
|
The clear guidelines are provided in the study to apply the WAS risk evaluation risk method? |
|
The clear results are provided after application of the WAS risk evaluation methods? |
|
The study under observation has been published in a relevant journal/conference? |
|
The other authors also cited the study? |
|
Extraction of Data for Questions | Answers |
Which journals/conferences include papers on web application security? | Journal/Conf Name |
What risks in web application security are addressed? | Risk Name |
Which risk from OWASP Top 10 web application security risks is addressed? | From OWASP Top 10 |
Which solutions of web application security have been proposed for web application development? |
|
Which type WAS method employed? | 1. Testing 2. Inspection 3.Inquiry Analytical 4. Modeling Simulation |
Which type of evaluation is performed by the WAS risk evaluation methods employed? | 1. Automated 2. Manual |
WAS risk evaluation methods is applied in which phase(s) and web artifacts? | 1. Requirement 2. Design 3. implementation |
Any feedback provided by the WAS evaluation methods? | 1. Yes 2. No |
There is empirical validation of web application security issue(s)? | 1. Case study 2. Experiment 3. Survey 4. No |