作者
O Sri Nagesh, P Laxmikanth, G Raja Vikram, VSSPLN Balaji Lanka
发表日期
2023/4/24
图书
XVIII International Conference on Data Science and Intelligent Analysis of Information
页码范围
631-639
出版商
Springer Nature Switzerland
简介
REST APIs can be used to programmatically access the most recent cloud and Internet services. As demonstrated in this paper, an inducer should be able to compromise a service by taking advantage of vulnerabilities in its REST API. Four security principles are discussed here. Desirable features should be able to be captured through REST APIs and services. The four security principles are as follows: X, X, X, and X. Examples of HTTP requests include GET, PUT, POST, and DELETE. Roy Fielding developed the idea of representational state transfer, and his work on representational state transfer is known by the abbreviation REST. A nice illustration is the usage of a POST request to create a record and a GET request to retrieve it. The first is an update request (PUT), and the second is a deletion request (DELETE). A web architectural design called REST controls how both clients and servers behave. However …
学术搜索中的文章
OS Nagesh, P Laxmikanth, GR Vikram, VB Lanka - XVIII International Conference on Data Science and …, 2023