Mots-clés : web applications.
@article{PDMA_2014_7_a37,
author = {D. N. Kolegov},
title = {General method for {HTTP} messages authentication based on hash functions in web applications},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {85--89},
year = {2014},
number = {7},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2014_7_a37/}
}
D. N. Kolegov. General method for HTTP messages authentication based on hash functions in web applications. Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 85-89. http://geodesic.mathdoc.fr/item/PDMA_2014_7_a37/
[1] Cheremushkin A. V., Kriptograficheskie protokoly. Osnovnye svoistva i uyazvimosti, Ucheb. posobie dlya stud. uchrezhdenii vyssh. prof. obrazovaniya, Izdatelskii tsentr “Akademiya”, M., 2009, 272 pp.
[2] Reducing web application attack surface, http://blog.spiderlabs.com/2012/07/reducing-web-apps-attack-surface.html
[3] Signing and Authenticating REST Requests, http://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
[4] Facebook developers reference, https://developers.facebook.com/docs/reference/php/facebook-getSignedRequest
[5] Barth A., Jackson C., Mitchell J., “Robust defences for cross-site request forgery”, Proc. 15th ACM Conf. on Computer and Communications Security, ACM Press, 2008, 75–87
[6] ModSecurity Advanced Topic of the Week: HMAC Token Protection, http://blog.spiderlabs.com/2014/01/modsecurity-advanced-topic-of-the-week-hmac-token-protection.html
[7] Understanding ASP.NET View State, http://msdn.microsoft.com/library/ms972976.aspx
[8] NIST 800-162. Guide to Attribute Based Access Control (ABAC) Definition and Considerations, http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf