Automation of Authorisation Vulnerability Detection in Authenticated Web Applications
N. Caffrey
A glossary of terms and some of the main concepts used in this chapter are described.