Return to Article Details
A security analysis of authentication and authorization implemented in web applications based on the REST architecture
Download
Download PDF