摘要 |
<p>Data can be securely passed between a client and a back-end resource by sending resource locators instead of the actual data. Using the protocol described here, the transfer of data is seamless, and prevents interception by any intermediate resource.</p> |