Anonymous Reader writes “Data received from the client needs further scrutiny to extend the security perimeter from common design elements to application code. To satisfy this requirement, This article offers a new security design framework that covers two common types of vulnerability: action tampering and parameter manipulation (also known as data tampering).”
Link: ibm.com/developerworks
Category:
- Web Development