Improving Web Application Security: Threats and Countermeasures
| Check | Description |
|---|---|
|
| The authentication strategy has been identified. |
|
| Privacy and integrity requirements of SOAP messages have been considered . |
|
| Identities that are used for resource access have been identified. |
|
| Implications of code access security trust levels have been considered. |
Категории