Welcome to the OWASP Papers Program
In an effort to promote more in-depth work in application security, the OWASP Papers program is now accepting paper submissions. Papers submitted to the OWASP Papers program will be reviewed by a team of senior application security experts. These reviewers will provide constructive feedback on submissions in the hopes of achieving a publishable quality paper. Papers that are approved by the review team will be published on the OWASP website and will be candidates for presentation at the next OWASP AppSec conference.
A note on plagiarism
Plagiarism is representing another person's work as one's own. According to Diana Hacker, "Three acts are plagiarism: (1) failing to cite quotations and borrowed ideas, (2) failing to enclose borrowed language in quotation marks and (3) failing to put summaries and paraphrases in your own words." Plagiarism is inconsistent with OWASP's goals and will result in permanent removal of your material from our site. Please report suspected plagiarism to firstname.lastname@example.org with as many details as possible.
Submitting a paper
To submit a paper, please use the following template for Microsoft Word documents. All submissions should be sent to email@example.com. By submitting a paper, you agree to having OWASP publish the paper on the OWASP website and that you will not distribute the paper via other channels. Your paper will be made available under the Creative Commons Share-Alike Attribution license.
- Document Security in Web Applications (Andres Desa)
- Discusses issues with protecting data in document form, such as Word, Excel, and PDF.
- Title (Author)
- Brief description
Pages in category "OWASP Papers"
This category contains only the following page.
Media in category "OWASP Papers"
The following 12 files are in this category, out of 12 total.
- Document Security in W...
- Expanding Exposure The...
- Phishing-a new age wea...
- Salted Hashes Demystif...
- Secure Web App Server...
- Securing Enterprise We...
- Security of Payment ca...
- Thick Client Applicati...
- Threat modelling of ph...
- Web services security.doc
- Your Customers and The...