[PDF][PDF] Modern tools and current trends in web-development

DP Mishra, KK Rout, SR Salkuti - … Journal of Electrical Engineering …, 2021 - academia.edu
testing of an application as the application grows is equally important, it can be achieved
through setting up an automated testing application … is logged in, a new JWT is created and the …

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

B Xu, S Jia, J Lin, F Zheng, Y Ma, L Liu, X Gu… - … on Research in …, 2023 - Springer
… has been devoted to checking the security of cryptographic usage in JWT applications. In …
program slicing technique to automatically identify cryptographic vulnerabilities in JWT

[HTML][HTML] Design of a secure wireless home automation system with an open home automation bus (OpenHAB 2) framework

RA Sowah, DE Boahene, DC Owoh, R Addo… - Journal of …, 2020 - hindawi.com
… It proposes a novel method using the AES and JWT security protocols tor enhanced security
… on the testing and performance evaluation of the proposed secure home automation system …

[PDF][PDF] FULL STACK WEB DEVELOPMENT OF REDUX-BASED WEB APPLICATIONS WITH DYNAMIC MICROSERVICES (CASE STUDY-IDEA REPOSITORY)

NK Bharali - irjmets.com
automated tests, with Jenkins based integration for simple and easy execution of integration
tests. The … To determine whether the JWT is legitimate, the REST API will compare the JWT's

JTDog: a gradle plugin for dynamic test smell detection

M Taniguchi, S Matsumoto… - … Software Engineering  …, 2021 - ieeexplore.ieee.org
… on test runtime behavior, lead to misunderstanding of the test results. For example, rotten
green tests give developers the false impression that the test … , even though the test was poorly …

Data protection by design tool for automated GDPR compliance verification based on semantically modeled informed consent

TR Chhetri, A Kurteva, RJ DeLong, R Hilscher, K Korte… - Sensors, 2022 - mdpi.com
tested endpoint access without a valid JWT in the first test … second test case, we tested
endpoint access using a valid JWT … third test case, we tested endpoint access using a valid JWT

[PDF][PDF] Asif Imran

N Soni - 2024 - scholarworks.calstate.edu
… It automates the process of deployment and testing also. • Modularity: We can implement …
test it against using JWT token and MTLS service. They developed a small prototype to develop

Automated Reusable Tests for Mitigating Secure Pattern Interpretation Errors

C Cunha, N Pombo - Ieee Access, 2023 - ieeexplore.ieee.org
… The credentials in the use case are JSON Web Tokens (JWT) [23] with the user profile
information. If the client owns the user data requested, all attributes presented in Figure 4 will be …

Specification-based security analysis of REST APIs

P Iversen - 2018 - ntnuopen.ntnu.no
testing as a part of their automated testing process, reducing the chance of introducing testable
security related software vulnerabilities in concurrent software … that the JWT under test is …

REST API Security: Testing and Analysis

L Kajavalta - 2022 - trepo.tuni.fi
… In addition to testing for JWT-related issues, automated tests were developed for the MFiles
API build pipeline to catch any issues that could arise in the future. The goal was to catch a …