Slide 12
Slide 12 text
ΫΤϦύϥϝʔλར༻ͷಛ
(JARͷ1. Introduction)
A. the communication through the user agents is not integrity
protected, and thus, the parameters can be tainted (integrity
protection failure) : ύϥϝʔλվม͞ΕΔՄೳੑ͕͋Δ
B. the source of the communication is not authenticated (source
authentication failure) : ϦΫΤετݩͷೝূ͕Ͱ͖ͳ͍
C. the communication through the user agents can be monitored
(containment/con
fi
dentiality failure) : ϒϥβ·ͨͪ͜ΒΛ…

12