Difference between revisions of "Key Project Information:OWASP Web Application Security Metric using Attack Patterns Project"

From OWASP
Jump to: navigation, search
(New page: ---- {| style="width:100%" border="0" align="center" ! colspan="8" align="center" style="background:#4058A0; color:white"|<font color="white">'''PROJECT INFORMATION''' |- | style="widt...)
 
Line 15: Line 15:
 
Project Leader<br>[[User:Raja krovi|'''Raja Krovi''']]
 
Project Leader<br>[[User:Raja krovi|'''Raja Krovi''']]
 
  | style="width:15%; background:#cccccc" align="center"|
 
  | style="width:15%; background:#cccccc" align="center"|
Project Contibutors<br>William Kumar Moses<br>Rajarshi<br>Yugandar<br>Pavan Kumar<br>Pranay<br>Jaswini<br>Haritha<br>Kedarnath
+
Project Contibutors<br>[[:OWASP Web Application Security Metric using Attack Patterns Project - Contributors|'''See here''']]
  
 
  | style="width:10%; background:#cccccc" align="center"|
 
  | style="width:10%; background:#cccccc" align="center"|
Line 32: Line 32:
 
  |-
 
  |-
 
  | style="width:29%; background:#cccccc" align="center"|
 
  | style="width:29%; background:#cccccc" align="center"|
Provisory '''[[:Category:OWASP Project Assessment#Alpha Quality Tool Criteria|Apha Quality]]'''<br>(under review)<br>[[:OWASP XXXX Project - Assessment Frame|Please see here for complete information.]]
+
'''[[:Category:OWASP Project Assessment#Alpha Quality Tool Criteria|Apha Quality]]'''<br>[[:OWASP Web Application Security Metric using Attack Patterns Project - Assessment Frame|Please see here for complete information.]]
 
  | style="width:42%; background:#cccccc" align="center"|
 
  | style="width:42%; background:#cccccc" align="center"|
 
* add link(s)
 
* add link(s)

Revision as of 12:33, 25 February 2009


PROJECT INFORMATION
Project Name OWASP Web Application Security Metric using Attack Patterns Project
Short Project Description

The Project provides attack pattern database along with prototype model. Currently the database is designed with 19 tables from both primary and secondary schema. The tool expects to collect security requirements from the user and then builds patterns knowledge whether existing or new knowledge on the data collected. Initially some attack patterns are created for database purpose and the community is allowed to extend for new data. The pattern data is supported with numerous fields.

Key Project Information

Project Leader
Raja Krovi

Project Contibutors
See here

Mailing List
[XXXX Subscribe here]
[mailto: XXXX Use here]

License
Creative Commons Attribution Share Alike 3.0

Project Type
Tool

Sponsors
if any, add link

Release Status Main Links Related Projects

Apha Quality
Please see here for complete information.

  • add link(s)
  • if any, add link(s)