Research Article
Automating Risk Analysis of Software Design Models
Listing 1
VOMS Admin CSRF threat identification.
(1) [CSRF] Path: {[VO Admin]-[App. server]-[VO Admin]} | (2) [CSRF] Path: {[VO Admin]-[App. server]-[Ident. User]} | (3) [CSRF] Path: {[VO Admin]-[App. server]-[Anon. User]} | (4) [CSRF] Path: {[Anon. User]-[App. server]-[VO Admin]} | (5) [CSRF] Path: {[Anon. User]-[App. server]-[Ident. User]} | (6) [CSRF] Path: {[Anon. User]-[App. server]-[Anon. User]} | (7) [CSRF] Path: {[Ident. User]-[App. server]-[VO Admin]} | (8) [CSRF] Path: {[Ident. User]-[App. server]-[Ident. User]} | (9) [CSRF] Path: {[Ident. User]-[App. server]-[Anon. User]} |
|