dc.contributor.author | FARRELL, STEPHEN | |
dc.date.accessioned | 2011-01-13T18:34:37Z | |
dc.date.available | 2011-01-13T18:34:37Z | |
dc.date.issued | 2011 | |
dc.date.submitted | 2011 | en |
dc.identifier.citation | Stephen Farrell, Leaky or Guessable Session Identifiers, IEEE Internet Computing, 15, 1, 2011, 88-91 | en |
dc.identifier.other | Y | |
dc.description | PUBLISHED | en |
dc.description.abstract | Many Internet and Web applications use session identifiers. Too often, developers of those applications make the bad assumption that all is well because session identifiers are only known to authorized users. However, in many cases, session identifiers can leak out or be guessed, sometimes trivially. If presenting an identifier is the only authorization an application requires, it can represent an easily exploited vulnerability. Although these vulnerabilities are old and well-known, some recent examples of problems arising from them show that developers must remain on guard against them. | en |
dc.format.extent | 88-91 | en |
dc.language.iso | en | en |
dc.publisher | IEEE | en |
dc.relation.ispartofseries | IEEE Internet Computing; | |
dc.relation.ispartofseries | 15; | |
dc.relation.ispartofseries | 1; | |
dc.rights | Y | en |
dc.subject | Computer sciences | en |
dc.subject | Network security | en |
dc.title | Leaky or Guessable Session Identifiers | en |
dc.type | Journal Article | en |
dc.type.supercollection | scholarly_publications | en |
dc.type.supercollection | refereed_publications | en |
dc.identifier.peoplefinderurl | http://people.tcd.ie/sfarrel6 | |
dc.identifier.rssinternalid | 70419 | |
dc.identifier.rssuri | http://doi.ieeecomputersociety.org/10.1109/MIC.2011.12 | en |
dc.identifier.uri | http://hdl.handle.net/2262/49131 | |