Show simple item record

dc.contributor.authorFARRELL, STEPHEN
dc.date.accessioned2011-01-13T18:34:37Z
dc.date.available2011-01-13T18:34:37Z
dc.date.issued2011
dc.date.submitted2011en
dc.identifier.citationStephen Farrell, Leaky or Guessable Session Identifiers, IEEE Internet Computing, 15, 1, 2011, 88-91en
dc.identifier.otherY
dc.descriptionPUBLISHEDen
dc.description.abstractMany Internet and Web applications use session identifiers. Too often, developers of those applications make the bad assumption that all is well because session identifiers are only known to authorized users. However, in many cases, session identifiers can leak out or be guessed, sometimes trivially. If presenting an identifier is the only authorization an application requires, it can represent an easily exploited vulnerability. Although these vulnerabilities are old and well-known, some recent examples of problems arising from them show that developers must remain on guard against them.en
dc.format.extent88-91en
dc.language.isoenen
dc.publisherIEEEen
dc.relation.ispartofseriesIEEE Internet Computing;
dc.relation.ispartofseries15;
dc.relation.ispartofseries1;
dc.rightsYen
dc.subjectComputer sciencesen
dc.subjectNetwork securityen
dc.titleLeaky or Guessable Session Identifiersen
dc.typeJournal Articleen
dc.type.supercollectionscholarly_publicationsen
dc.type.supercollectionrefereed_publicationsen
dc.identifier.peoplefinderurlhttp://people.tcd.ie/sfarrel6
dc.identifier.rssinternalid70419
dc.identifier.rssurihttp://doi.ieeecomputersociety.org/10.1109/MIC.2011.12en
dc.identifier.urihttp://hdl.handle.net/2262/49131


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record