M. V. Kadam

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In many organizations, transformation of information and storage of sensitive data has highest priority. Client data should be kept secret as well as inaccessible from all other unauthorized hacks [1]. To maintain the security of the user data, cloud computing environment has practiced. The cloud computing is a cost-effective, service availability, flexible(More)
Database based Web applications have been widely incorporated on the Internet and organizations use these services to provide a broad range of services to people. Along with the growing of the internet, there has been a surge in attacks that target these applications. In typical cross site scripting the target views a website which contains code inserted(More)
  • 1