CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES
摘要
<p>Methods for server security verification include acquiring a public key associated with a received report that includes an indication regarding the presence of a vulnerability for each vulnerability, the report having been generated at a server (204); decrypting the received report using the public key (210); determining a level of server-side security based on the decrypted report using a processor (212); and reconfiguring a browser at the client responsive to the determined level of server-side security (316).</p>