Mashup security

Technologies and techniques for securing UI artifacts and data in a mashup

From the developerWorks archives

J. Hanson

Date archived: January 4, 2017 | First published: August 04, 2009

The mashup development model enables a vast array of possibilities for the Web landscape. This openness, however, presents a plethora of new security vulnerabilities. Discover tips and techniques for addressing some of these problems.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.

Zone=Web development
ArticleTitle=Mashup security