Russell E Glaue

A Survey of Ajax

  1. Abstract
  2. History
    1. The Evolution of the Web Browser as the Ajax Software Application Platform
    2. The Evolved Ajax Programming Method
  3. Interaction Model
    1. Web 2.0 Ajax Technology
    2. Stateful and Stateless Application Sessions
    3. Data Structures and Marshalling
  4. Failure Model
    1. Ajax is Subject to Failures of its Uncontrollable Underlying Technology
    2. Controlling Failures in Ajax
    3. Managing XMLHttpRequest with Ajax Frameworks
    4. Handling Errors in Ajax
  5. Security Model
    1. Authorization and Access Rights
    2. Encryption
    3. The Cross-domain Security Restriction
    4. Vulnerabilities
  6. Examples of Ajax


Used as a primary idea for implementing what is coined Web 2.0, Ajax has changed how content is delivered to users via the WWW (Wold Wide Web). Computer Science students graduating today will likely never be able to work in the field of Computer Science without encountering web based applications using Ajax methods. It is important to know the basics of what Ajax is, how it is used, and what its failures and vulnerabilities are. In this paper we will describe these basic aspects of Ajax, introducing it to the reader with an approach through a familiar fundamental system model.