_version_ 1809901670975406080
annif_keywords_txtF_mv systematic reviews literature surveys methods data security information retrieval
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p29683 http://www.yso.fi/onto/yso/p7595 http://www.yso.fi/onto/yso/p1913 http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p2964
author Jussila, Juha
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojenkäsittelytiede Computer Science 601
author_facet Jussila, Juha Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojenkäsittelytiede Computer Science 601 Jussila, Juha
author_sort Jussila, Juha
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2019-08-19T08:21:24Z
format Pro gradu
format_ext_str_mv Opinnäyte Pro gradu
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review</title><creator>Jussila, Juha</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Tietojenk&#xE4;sittelytiede</contributor><contributor type="oppiaine" lang="en">Computer Science</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">HTTP cookie</subject><subject type="other">vulnerability</subject><subject type="other">cross-site scripting</subject><subject type="other">cross-site request forgery</subject><subject type="other">TCP/IP hijacking</subject><subject type="other">session fixation</subject><subject type="yso">tietoturva</subject><subject type="yso">ev&#xE4;steet</subject><subject type="yso">data security</subject><subject type="yso">cookies (files)</subject><available>2018-08-02T07:54:44Z</available><issued>2018</issued><type lang="fi">Pro gradu -tutkielma</type><type lang="en">Master&#x2019;s thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/59084</identifier><identifier type="urn">URN:NBN:fi:jyu-201808023720</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201808023720</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/59084/1/URN%3aNBN%3afi%3ajyu-201808023720.pdf" name="URN:NBN:fi:jyu-201808023720.pdf" type="application/pdf" length="690569" sequence="1"/><recordID>123456789_59084</recordID></qualifieddc>
id jyx.123456789_59084
language eng
last_indexed 2024-09-03T10:50:56Z
main_date 2018-01-01T00:00:00Z
main_date_str 2018
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/59084\/1\/URN%3aNBN%3afi%3ajyu-201808023720.pdf","text":"URN:NBN:fi:jyu-201808023720.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2018-08-19T08:21:24Z
publishDate 2018
record_format qdc
source_str_mv jyx
spellingShingle Jussila, Juha HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review HTTP cookie vulnerability cross-site scripting cross-site request forgery TCP/IP hijacking session fixation tietoturva evästeet data security cookies (files)
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_59084&index=0&size=large
title HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review
title_full HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review
title_fullStr HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review
title_full_unstemmed HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review
title_short HTTP cookie weaknesses, attack methods and defense mechanisms
title_sort http cookie weaknesses attack methods and defense mechanisms a systematic literature review
title_sub a systematic literature review
title_txtP HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review
topic HTTP cookie vulnerability cross-site scripting cross-site request forgery TCP/IP hijacking session fixation tietoturva evästeet data security cookies (files)
topic_facet HTTP cookie TCP/IP hijacking cookies (files) cross-site request forgery cross-site scripting data security evästeet session fixation tietoturva vulnerability
url https://jyx.jyu.fi/handle/123456789/59084 http://www.urn.fi/URN:NBN:fi:jyu-201808023720
work_keys_str_mv AT jussilajuha httpcookieweaknessesattackmethodsanddefensemechanismsasystematicliteraturereview