Last update: Sun Apr 28 02:05:21 MDT 2019
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Desmet:2008:PPA,
author = "L. Desmet and P. Verbaeten and W. Joosen and F.
Piessens",
title = "Provable Protection against {Web} Application
Vulnerabilities Related to Session Data Dependencies",
journal = j-IEEE-TRANS-SOFTW-ENG,
volume = "34",
number = "1",
pages = "50--64",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "IESEDJ",
DOI = "https://doi.org/10.1109/TSE.2007.70742",
ISSN = "0098-5589 (print), 1939-3520 (electronic)",
ISSN-L = "0098-5589",
bibdate = "Thu Feb 1 11:00:42 MST 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4359468",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Software Engineering",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}
Related entries
- against,
26(1)55
- application,
26(4)293,
26(4)362,
27(4)289,
27(6)550,
27(9)827,
28(3)286,
28(3)308,
28(11)1039,
29(6)567,
29(6)572,
29(10)929,
29(12)1059,
30(1)59,
30(4)257,
30(4)278,
30(9)601,
30(10)656,
30(10)694,
30(12)841,
30(12)1072,
31(3)187,
31(4)292,
31(11)928,
32(5)281,
32(9)718,
33(3)186,
33(7)433,
33(10)643,
33(12)837,
34(1)65,
34(2)260,
34(4)531,
34(6)860,
35(1)142
- data,
26(3)227,
26(6)567,
26(10)959,
27(1)1,
27(3)193,
27(9)788,
27(10)890,
27(11)987,
27(11)999,
27(12)1085,
28(7)625,
28(10)997,
29(4)290,
30(6)403,
30(11)754,
30(12)993,
31(2)116,
31(3)187,
31(12)1074,
32(11)849,
32(12)931,
32(12)988,
33(1)2,
33(9)635,
33(9)637,
35(4)484,
35(4)497,
35(4)534
- Dependencies,
32(10)790,
35(6)864
- protection,
28(8)735
- related,
32(3)176
- Session,
35(3)368
- Vulnerability,
33(3)171,
33(8)544
- Web,
27(11)1023,
30(5)311,
30(11)754,
31(3)187,
31(12)1042,
33(10)643,
33(12)869,
34(1)33,
34(1)65,
34(3)377,
34(6)723,
35(5)669