Return to Article Details A security analysis of authentication and authorization implemented in web applications based on the REST architecture Download Download PDF