This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Event Item"
From OWASP
| (2 intermediate revisions by the same user not shown) | |||
| Line 3: | Line 3: | ||
!style="border-style: solid; border-width: 0 1px 1px 0"| Item | !style="border-style: solid; border-width: 0 1px 1px 0"| Item | ||
!style="border-style: solid; border-width: 0 1px 1px 0"| Description | !style="border-style: solid; border-width: 0 1px 1px 0"| Description | ||
| − | |||
|- | |- | ||
|style="border-style: solid; border-width: 0 1px 1px 0"| Event title | |style="border-style: solid; border-width: 0 1px 1px 0"| Event title | ||
| − | + | |style="border-style: solid; border-width: 0 1px 1px 0"| OWASP Netherlands Chapter Meeting with Jim Manico | |
| − | |style="border-style: solid; border-width: 0 1px 1px 0"| OWASP Netherlands Chapter Meeting | ||
|- | |- | ||
|style="border-style: solid; border-width: 0 1px 1px 0"| Date | |style="border-style: solid; border-width: 0 1px 1px 0"| Date | ||
| − | |style="border-style: solid; border-width: 0 1px 1px 0"| | + | |style="border-style: solid; border-width: 0 1px 1px 0"| March 15th, 2012 |
| − | |||
|- | |- | ||
|style="border-style: solid; border-width: 0 1px 1px 0"| Location | |style="border-style: solid; border-width: 0 1px 1px 0"| Location | ||
| − | |style="border-style: solid; border-width: 0 1px 1px 0"| | + | |style="border-style: solid; border-width: 0 1px 1px 0"| SurfNet, Utrecht |
| − | |||
|- | |- | ||
|style="border-style: solid; border-width: 0 1px 1px 0"| Event announcement | |style="border-style: solid; border-width: 0 1px 1px 0"| Event announcement | ||
| − | |style="border-style: solid; border-width: 0 1px 1px 0"| | + | |style="border-style: solid; border-width: 0 1px 1px 0"| Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and "fail open" access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism. |
| − | |||
|- | |- | ||
|style="border-style: solid; border-width: 0 1px 1px 0"| Event Program | |style="border-style: solid; border-width: 0 1px 1px 0"| Event Program | ||
| − | + | |style="border-style: solid; border-width: 0 1px 1px 0"| 18:00 - 18:45 Registration with drinks and snacks<br/>18:45 - 19:00 OWASP Netherlands Chapter Update<br/>19:00 - 20:00 Jim Manico on Authentication<br/>20:00 - 20:15 Break<br/>20:15 - 21:00 Q&A with Jim Manico<br/> | |
| − | |style="border-style: solid; border-width: 0 1px 1px 0"| 18:00 - 18: | ||
|- | |- | ||
|style="border-style: solid; border-width: 0 1px 1px 0"| Travel | |style="border-style: solid; border-width: 0 1px 1px 0"| Travel | ||
| − | |style="border-style: solid; border-width: 0 1px 1px 0"| | + | |style="border-style: solid; border-width: 0 1px 1px 0"| SurfNet Utrecht, Radboudkwartier 273, 3511 CK Utrecht, The Netherlands |
| − | |||
|- | |- | ||
|style="border-style: solid; border-width: 0 1px 1px 0"| Registration | |style="border-style: solid; border-width: 0 1px 1px 0"| Registration | ||
| − | |style="border-style: solid; border-width: 0 1px 1px 0"| | + | |style="border-style: solid; border-width: 0 1px 1px 0"| http://www.eventbrite.com/event/2714165141 |
| − | |||
|} | |} | ||
Latest revision as of 13:03, 16 February 2012
| Item | Description |
|---|---|
| Event title | OWASP Netherlands Chapter Meeting with Jim Manico |
| Date | March 15th, 2012 |
| Location | SurfNet, Utrecht |
| Event announcement | Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and "fail open" access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism. |
| Event Program | 18:00 - 18:45 Registration with drinks and snacks 18:45 - 19:00 OWASP Netherlands Chapter Update 19:00 - 20:00 Jim Manico on Authentication 20:00 - 20:15 Break 20:15 - 21:00 Q&A with Jim Manico |
| Travel | SurfNet Utrecht, Radboudkwartier 273, 3511 CK Utrecht, The Netherlands |
| Registration | http://www.eventbrite.com/event/2714165141 |