<?xml version="1.0" encoding="us-ascii"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article article-type="research-article" xml:lang="EN" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">LIBER</journal-id>
<journal-title-group>
<journal-title>LIBER QUARTERLY</journal-title>
</journal-title-group>
<issn pub-type="epub">2213-056X</issn>
<publisher>
<publisher-name>Uopen Journals</publisher-name>
<publisher-loc>Utrecht, The Netherlands</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">lq.10178</article-id>
<article-id pub-id-type="doi">10.18352/lq.10178</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Web Interface Security Vulnerabilities of Selected European Open-access Academic Repositories</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Formanek</surname>
<given-names>Matus</given-names>
</name>
<email>matus.formanek@mediamatika.sk</email>
<xref ref-type="aff" rid="aff1"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zaborsky</surname>
<given-names>Martin</given-names>
</name>
<email>martin.zaborsky@mediamatika.sk</email>
<xref ref-type="aff" rid="aff1"/>
</contrib>
<aff id="aff1">Department of Mediamatics and Cultural Heritage, University of Zilina, Slovak Republic</aff>
</contrib-group>
<pub-date pub-type="epub">
<month>2</month>
<year>2017</year>
</pub-date>
<volume>27</volume>
<issue>1</issue>
<fpage>45</fpage>
<lpage>57</lpage>
<permissions>
<copyright-statement>Copyright 2017, The copyright of this article remains with the author</copyright-statement>
<copyright-year>2017</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. See <uri xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</uri>.</license-p>
</license>
</permissions>
<self-uri xlink:href="https://www.liberquarterly.eu/article/10.18352/lq.10178"/>
<abstract>
<p>The given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science. It focuses on the presence and qualities of the secure HTTPS protocol via SSL/TLS protocols. The security of the transmitted data is particularly important in the network environment of the Internet, especially if log-in user data is transmitted. Disclosure may have a direct impact on saved digital objects and their metadata which together represent the most valuable parts of systems of digital libraries and repositories. Furthermore, the paper points to the most noticeable vulnerabilities of protocols of web interfaces and presents practical recommendations for the expert public. These may contribute to the increase of the level of security of the discussed systems. The authors base their proposals on the currently available scientific publications and scientific articles about the given topic.</p>
</abstract>
<kwd-group>
<kwd>digital library</kwd>
<kwd>web vulnerabilities</kwd>
<kwd>security</kwd>
<kwd>repository administration</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1. Reasons for Research Realization</title>
<p>Nowadays, the issues of computer security are of great interest, especially in a network environment where various electronic systems are closely interconnected and transmit sensitive user data. It is said that we live in a so-called Information Age, when &#x201C;information security and privacy are very important issues&#x201D; (<xref ref-type="bibr" rid="r2">Al-Suqri &#x0026; Akomolafe-Fatuyi, 2012</xref>).</p>
<p>According to the current Internet Security Threat Report published by <xref ref-type="bibr" rid="r16">Symantec (2016</xref>, p. 18), <italic>&#x201C;effective security requires layers of security built into devices and the infrastructure that manages them, including authentication, code signing, and on-device security&#x2026; Analytics, auditing, and alerting are also key to understanding the nature of threats emerging in this area. Finally, strong SSL/TLS encryption technology plays a crucial role in authentication and data protection.&#x201D;</italic> There is much more information about the cybersecurity challenges and the threats in this online accessible document.<xref ref-type="fn" rid="fn1">1</xref></p>
<p>ICT tools offer wide possibilities of access to information, which users may use quickly and simply thanks to the Internet. The aspect of network connection, however, brings certain risks. The most sensitive aspect is the system and network security of important electronic systems such as digital libraries or academic institutional repositories. They may fulfil their role only if they can offer their service securely and stably in the broader environment of the Internet, where <italic>&#x201C;information security and privacy are very important issues. Standards and mechanisms for the protection of the information during data transfer are also very important as technology changes and improvements in information storage are made, earlier information resources in print format need to be transferred to progressively newer technologies over time, as older forms gradually become obsolete&#x201D;</italic> (<xref ref-type="bibr" rid="r2">Al-Suqri &#x0026; Akomolafe-Fatuyi, 2012</xref>). This results in such a state that <italic>&#x201C;the velocity of information dissemination sometimes overshadows integrity, the regulations and policies that govern the circulation of information&#x201D;</italic> (<xref ref-type="bibr" rid="r2">Al-Suqri &#x0026; Akomolafe-Fatuyi, 2012</xref>). </p>
<p>Several experts have already studied these issues. In her paper, <xref ref-type="bibr" rid="r10">Kuzma (2010)</xref> dealt with the analysis of the security of web portals of 80 selected digital libraries in four European countries. She presents attacks of hackers on academic digital libraries in the American state of Indiana in 2002 and 2004 as a warning.</p>
<p>Increased security is one of the factors that may significantly increase the general value of network applications. It may also help to achieve a higher level of trust in online services (<xref ref-type="bibr" rid="r4">Chen, Choo, &#x0026; Chow, 2006</xref>). The loss of trust of users may have harmful consequences in addition to the risk of personal information theft (<xref ref-type="bibr" rid="r10">Kuzma, 2010</xref>). </p>
<p>Web 2.0 tools offer possibilities for using user identity in the network environment due to which transfer of corresponding log-in and other data to various web applications (phone numbers, addresses, numbers of payment cards etc.) occurs. Web 2.0 applications run in browsers, which are mediators between users and applications. Various web threats have a higher impact nowadays than ever before (<xref ref-type="bibr" rid="r17">&#x0160;ili&#x0107;, Krolo, &#x0026; Dela&#x010D;, 2010</xref>). All applications using networks&#x2014;among which we count digital libraries as well&#x2014;require a properly chosen security mechanism of the transferred data because these systems use and store the user credentials, satisfy information needs and should stay accessible online 24/7.</p>
<p>Studies about the issues of security of digital libraries, their web interfaces or content, are not easily available, especially in a required width and depth of topical take appropriate for the community of library workers. <xref ref-type="bibr" rid="r10">Kuzma (2010)</xref> also points out this fact. She claims that the issue of security of user interfaces of digital libraries is not studied enough, not even today. The expert community lacks literature about this topic. As a result, there is a lower level of awareness about security risks, which loom over all computer systems in the Internet environment, including repositories and digital libraries.</p>
<p>Another problem lies in the fact that library workers and librarians themselves do not often realize the aspects of computer security of the library systems and networks they work with (<xref ref-type="bibr" rid="r6">Fox, 2006</xref>). <xref ref-type="bibr" rid="r6">Fox (2006)</xref> adds that digital content is usually very valuable and library workers have to protect it as well as they protect data about visitors. We realize that these workers are not specialized in the field of security of IT systems but these problems must not be underestimated.</p>
</sec>
<sec id="s2">
<title>2. SSL/TLS protocols</title>
<p>One of the key requirements in secure communication within the network is the encoding of the connection to ensure that the communication is not compromised, not even if the message is captured. For this purpose, security network protocols SSL (Secure Socket Layer) and the newer TLS (Transport Layer Security) are used. Technologies based on these protocols enable creating an encrypted connection between a client (e.g. a browser) and a server.</p>
<p>During authentication of a connection and transfer of messages, the SSL protocol uses the combination of symmetric and asymmetric encryption. As seen from the <xref ref-type="fig" rid="fg001">Figure 1</xref> below, upon request for a secure connection, the server sends its public key together with a digital certificate (handshake stage) to the client. The client verifies the X.509 certificate&#x2019;s validity and if there are no doubts about the server identity, it generates a random number as a base for a session key, which is encrypted by the public key of the server and sent back to the server. Using its private key, the server decrypts the obtained data and both sides create a unique session key. After the handshake stage, all communication is encoded using the created shared key, which is valid for the given session only (<xref ref-type="bibr" rid="r15">Rouse, 2014</xref>). When taking the ISO OSI reference model into consideration, the SSL protocol can be found in the presentation layer. In the TCP/IP model, it sits in the application layer (<xref ref-type="bibr" rid="r9">Kozierok, 2005</xref>).</p>
<fig id="fg001">
<label>Fig. 1:</label>
<caption><p>The SSL technology principle (<xref ref-type="bibr" rid="r8">Internetum, 2015</xref>).</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="figures/Formanek_and_Zaborsky_fig1.jpg"/>
</fig>
<p>The digital certificate of a server should be released and signed by a generally accepted certificate authority in order to prevent a scenario in which an attacker would pretend to be the certificate authority. Via visual clues, modern browsers inform the user that the communication with the web server is secure and it has a valid safety/security certificate issued by the accepted certification authority. The TLS protocol is a newer version of SSL and is compatible with it. For both protocols, the general name SSL or rather SSL/TLS is used.</p>
</sec>
<sec id="s3">
<title>3. Aims of the Research</title>
<p>The main aim of our research is to present the status quo regarding the use of secured web protocols by selected institutional repositories in Europe, to point out possible weak spots, and to propose recommendations for improvement. We analysed the LIS institutional repositories only because it fits the particular scope of our academic research about repositories. We want to adapt an academic repository based on open-source software for the LIS department of University of Zilina in the near future.</p>
<p>We do not want to point out security flaws of specific institutions (and expose them to attacks) nor decrease their status because administrators of digital repositories are not necessarily computer experts. </p>
</sec>
<sec id="s4">
<title>4. Methods</title>
<p>We chose repositories by selecting them from OpenDOAR.org&#x2014;the authoritative directory of registered academic open-access repositories (<xref ref-type="bibr" rid="r18">University of Nottingham, 2014</xref>). We used the following selection criteria:</p>
<list list-type="bullet">
<list-item><p>they should be institutional repositories,</p></list-item>
<list-item><p>part of the content of repositories as well as their interfaces must be available also in English,</p></list-item>
<list-item><p>the repositories should be located in Europe,</p></list-item>
<list-item><p>their focus must include the LIS area (Library and Information Science).</p></list-item>
</list>
<p>As of June 9, 2016, based on the aforementioned criteria, the openDOAR.org registry listed only 33 repositories. We studied all these repositories in more detail. We carried out the testing of the web interfaces in two stages:</p>
<list list-type="simple">
<list-item><label>Stage 1.</label><p>Using the information stated in the record of every repository in openDOAR.org, we found a link to the main official page of the each system. Using the Mozilla Firefox v47 browser, we observed whether the interface natively supported the secured protocol HTTPS, either on the whole site or on the log-in page.</p></list-item>
<list-item><label>Stage 2.</label><p>We tested those web interfaces that supported the HTTPS protocol using two independent tools:</p>
<list list-type="alpha-lower">
<list-item><p>SSL server test by Qualis SSL Labs company.<xref ref-type="fn" rid="fn2">2</xref> <italic>&#x201C;This free online service performs a deep analysis of the configuration of any SSL web server&#x201D;</italic> (<xref ref-type="bibr" rid="r14">Qualis SSL Labs, 2016</xref>).</p>
<p>The test focuses on the depth analysis of the current configuration of security certificates and supported cipher algorithms. It looks for vulnerabilities in the form of support of outdated technologies. Furthermore, the test simulates a so-called handshake of various versions of operating systems, browsers (Android, IE v6-11, EDGE, Firefox, Safari etc.), and JAVA web technologies.</p></list-item>
<list-item><p>SSL/TLS server test by High-Tech Bridge company.<xref ref-type="fn" rid="fn3">3</xref> It is &#x201C;<italic>aimed to enable anyone to assess how secure and reliable his or her SSL/TLS connection to a server (on any port) is, the service performs four distinct tests: Test for compliance with NIST Guidelines, for compliance with PCI DSS Requirements, for the most recent SSL/TLS vulnerabilities and test for insecure third-party content that may expose user&#x2019;s privacy&#x201D;</italic> (<xref ref-type="bibr" rid="r7">High-Tech Bridge, 2016</xref>).</p></list-item>
</list></list-item>
</list>
<p>We chose these tools because they represent a simple, available and mainly transparent way of testing the safety components of web pages. Tests may be carried out from any place and they may be repeated at any time. Another crucial element was the identical form of the results that these tests offer&#x2014;they evaluate web portals using the usual scale from A to F, which is also used in the academic research. Partial steps, such as A- or B&#x002B; are also used to achieve finer granularity of the results. A&#x002B; represents a better level of evaluation than A which is better than A- and so on.</p>
</sec>
<sec id="s5">
<title>5. Test Results</title>
<p>During the first stage, 3 out of the 33 repositories did not work and thus it was impossible to determine whether their interface supported the secured web protocol. Their web domain was repeatedly unavailable during our analysis (May&#x2013;June 2016).</p>
<p>As seen from the <xref ref-type="fig" rid="fg002">Figure 2</xref> bellow, only 8 repositories use the HTTPS protocol natively in the whole interface (all web pages of a particular domain). That means that the encoded data transfer is available right after the user visits the page, or rather there is an automatic redirecting of the visitor from the unsecured HTTP protocol to the secured HTTPS (S &#x003D; secure). The most important transfer of sensitive user data (such as access names and passwords) occurs in the forms of login pages. </p>
<fig id="fg002">
<label>Fig. 2:</label>
<caption><p>Use of the HTTPS in repository web interfaces.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="figures/Formanek_and_Zaborsky_fig2.jpg"/>
</fig>
<p>Many system administrators realize this fact and as a result only this login page is secured by the HTTPS protocol in exactly 7 repositories of our study.</p>
<p>The amount of studied academic repositories that do not use a secured protocol altogether, not even at login pages where users (as well as administrators) input their user credentials, is alarming: 15 systems (which is 50&#x0025; of functioning systems involved in tests) <bold>do not use any form of security for data transfer</bold>. Those are not systems in the early stage of development or testing but production systems containing digital objects and content that is valuable for the given institution. This is unsettling because these systems are exposed to potential cyber-attacks and compromising of saved data.</p>
<p>In the second stage of our study, we looked into 15 web interfaces of individual repositories (8 in the web pages of the whole domain &#x002B; 7 in the login page only), which used the HTTPS secured protocol. Again, test results were quite unsettling although we appreciate the use of the secured protocol.</p>
<p>In <xref ref-type="fig" rid="fg003">Figure 3</xref>, we see the scores that the SSL/TLS certificates obtained in two mutually independent security tests. The unsatisfactory level of evaluation F (Failed) is worth noticing because it was assigned to quite a large number of certificates of web interfaces of studied academic repositories. Three out of the total number of 15 certificates had the worst evaluation F in both tests.</p>
<fig id="fg003">
<label>Fig. 3:</label>
<caption><p>Summarized scores for certificates.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="figures/Formanek_and_Zaborsky_fig3.jpg"/>
</fig>
<p>We do not want to point out the flaws of particular web interfaces and draw negative attention to specific institutions. This is why we will not write the names of repositories nor institutions that cover them. The aim of the carried-out measurements is to point out the extent of the security problem, which needs to be solved in time. Having tried to help with the solution, we examined the most frequent causes for negative evaluations in the tests of SSL/TLS certificates in more detail. <xref ref-type="fig" rid="fg004">Figure 4</xref> shows the most frequent reasons for bad scores. The substeps of the grades (such as A&#x002B;, A- etc.) are not included in the <xref ref-type="fig" rid="fg004">Figure 4</xref> because there are only small differences between the main grade and related substeps. The D grade is omitted because it was not obtained during the testing at all.</p>
<fig id="fg004">
<label>Fig. 4:</label>
<caption><p>Main reasons for low scores.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="figures/Formanek_and_Zaborsky_fig4.jpg"/>
</fig>
<p>During the testing, we found that one of the most significant and currently highly-discussed security problems is a vulnerability known as CVE-2016-2107 discovered by Juraj Somorovsky on 13 April 2016. It is the<italic> OpenSSL Padding oracle vulnerability</italic> as can be seen in <xref ref-type="fig" rid="fg004">Figure 4</xref>. The core of this problem lies in the fact that a so-called Man-in-the-middle <italic>&#x201C;attacker can use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server support AES-NI&#x201D;</italic> (<xref ref-type="bibr" rid="r11">OpenSSL, 2016a</xref>). </p>
<p>Simply put, this vulnerability enables the attacker to decode the communication between the client and the server during the data transfer despite this channel being coded by means of the AES-NI algorithm (abbrev. from Advanced Encryption Standard New Instructions). Shortly after that, another vulnerability was discovered which is caused by a critical error in memory (using so-called buffer underrun). It is known as CVE-2016-2108. Both vulnerabilities were fixed in quite a short time. Afterwards, new fixed updates of cryptography and the SSL/TLS toolkit &#x201C;OpenSSL&#x201D; were released. Regarding both aforementioned vulnerabilities, the only secure protection against them is an update and use of the newest version of the toolkit. During the writing of this article, it was version 1.0.2h or 1.0.1t released on 3 May 2016 (<xref ref-type="bibr" rid="r12">OpenSSL, 2016b</xref>).</p>
<p>Two other aforementioned critical vulnerabilities, which caused the F grade, are caused by the server support of the out-dated SSLv2 protocol, which is not recommended for use (not even its updated SSLv3 version). According to expert security portals (such as disablessl3.com, digicert.com and others), it is customary to block the support of SSL v2/v3 protocols in browsers for the sake of security and because of the number of possible threats. Progressively, these protocols are replaced by much safer TLS protocols (the newest version is TLS 1.2). This step significantly prevents other vulnerabilities (which caused the C grades in <xref ref-type="fig" rid="fg004">Figure 4</xref>): it is &#x201C;<italic>a proactive way to combat the &#x201C;POODLE&#x201D; vulnerability</italic>&#x201D; (<xref ref-type="bibr" rid="r5">Digicert, 2016</xref>). When using TLS protocols, one must pay attention to their up-to-dateness and replace TLS 1.0/TLS 1.1 by TLS 1.2 wherever it is possible.</p>
<p>We did not describe rare or less serious vulnerabilities which are outside the scope of this article. More information about the topic may be found on specialized web pages, such as open-source project called <xref ref-type="bibr" rid="r13">OpenSSL (2016c)</xref>, specialized webpages and technical papers about DROWN attack (<xref ref-type="bibr" rid="r3">Aviram et al., 2016</xref>) or about Diffie-Hellman key exchange (<xref ref-type="bibr" rid="r1">Adrian et al., 2015</xref>).</p>
</sec>
<sec id="s6">
<title>6. Conclusion</title>
<p>In this paper, we presented alarming results of our analysis. 50&#x0025; of investigated European digital repositories (listed in OpenDOAR.org registry) that cover the field of library and information science <bold>do not use any kind of transfer security for access and other user data</bold>. The relatively high number of bad scores (especially score &#x201C;F&#x201D; in any of the tests) for the certificates is alarming, too. We realize that we cannot expect expert knowledge about security of web interfaces from librarians. However, these people often administer digital libraries and repositories. </p>
<p>Rapid development in the field of network computer security and constant discoveries of new security vulnerabilities require repository admins to closely cooperate with IT experts in the field of web security. These will follow the newest trends, implement, and last but not least, update web certificates of online repositories. We think that in the university environment where academic repositories are found, it will not be a problem to secure appropriate technical support. Our recommendation for repository administrators is to use high-quality updated TLS 1.2 security protocols which protect the flow of sensitive users as well as admin access (and other) data. Many cyber attackers wait for just a little mistake unintentionally made by admins or users. When using security cryptographic web protocols, repository admins protect the online identity of the repository and its reputation as well as the personal data of users and visitors, and valuable digital objects found in the repositories.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="r1"><mixed-citation>Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., &#x2026;, &#x0026; Zimmermann, P. (2015). Imperfect forward secrecy: How Diffie-Hellman fails in practice. In <italic>Proceedings of the 22nd ACM SIGSAC Conference on computer and communications security</italic> (pp. 5&#x2013;17). New York: ACM Digital Library. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/2810103.2813707">https://doi.org/10.1145/2810103.2813707</ext-link>. Retrieved October 7, 2016, from <ext-link ext-link-type="uri" xlink:href="https://weakdh.org">https://weakdh.org</ext-link></mixed-citation></ref>
<ref id="r2"><mixed-citation>Al-Suqri, M.N., &#x0026; Akomolafe-Fatuyi, E. (2012). Security and privacy in digital libraries: challenges, opportunities and prospects. <italic>International Journal of Digital Library Systems, 3</italic>(4), 54&#x2013;61. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4018/ijdls.2012100103">https://doi.org/10.4018/ijdls.2012100103</ext-link></mixed-citation></ref>
<ref id="r3"><mixed-citation>Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., &#x2026;, &#x0026; Shavitt, Y. (2016). DROWN: Breaking TLS using SSLv2. In <italic>Proceedings of the 25th USENIX Security Symposium</italic> (pp. 689&#x2013;706). Berkeley, CA: The USENIX Association. Retrieved October 7, 2016, from <ext-link ext-link-type="uri" xlink:href="https://drownattack.com/drown-attack-paper.pdf">https://drownattack.com/drown-attack-paper.pdf</ext-link></mixed-citation></ref>
<ref id="r4"><mixed-citation>Chen, S., Choo, C., &#x0026; Chow, R.Y. (2006). Internet security: A novel role/Object-based access control for digital libraries. <italic>Journal of Organizational Computing and Electronic Commerce, 16</italic>(2), 87&#x2013;103. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1207/s15327744joce1602_1">https://doi.org/10.1207/s15327744joce1602_1</ext-link></mixed-citation></ref>
<ref id="r5"><mixed-citation>DigiCert. (2016). <italic>Disabling browser support for the SSL 3.0 protocol</italic>. Retrieved June 5, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.digicert.com/ssl-support/disabling-browser-support-ssl-v3.htm">https://www.digicert.com/ssl-support/disabling-browser-support-ssl-v3.htm</ext-link></mixed-citation></ref>
<ref id="r6"><mixed-citation>Fox, R. (2006). Digital libraries: The systems analysis perspective, vandals at the gates. <italic>OCLC Systems &#x0026; Services: International digital library perspectives, 22</italic>(4), 249&#x2013;255. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/10650750610706961">https://doi.org/10.1108/10650750610706961</ext-link></mixed-citation></ref>
<ref id="r7"><mixed-citation>High-Tech Bridge. (2016). <italic>Free SSL server test: About the service</italic>. Retrieved June 12, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.htbridge.com/ssl/&#x0023;about">https://www.htbridge.com/ssl/&#x0023;about</ext-link></mixed-citation></ref>
<ref id="r8"><mixed-citation>Internetum. (2015). <italic>What is SSL certificate and how it works?</italic> Retrieved November 23, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.internetum.com/what-is-ssl-certificate-and-how-it-works/">https://www.internetum.com/what-is-ssl-certificate-and-how-it-works/</ext-link></mixed-citation></ref>
<ref id="r9"><mixed-citation>Kozierok, Ch.M. (2005). <italic>The TCP/IP guide: A comprehensive, illustrated internet protocols reference</italic>. San Francisco: No Starch Press.</mixed-citation></ref>
<ref id="r10"><mixed-citation>Kuzma, J. (2010). European digital libraries: Web security vulnerabilities. <italic>Library Hi Tech, 28</italic>(3), 402&#x2013;413. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/07378831011076657">https://doi.org/10.1108/07378831011076657</ext-link></mixed-citation></ref>
<ref id="r11"><mixed-citation>OpenSSL. (2016a). Padding oracle in AES-NI CBC MAC check (CVE-2016-2107). <italic>OpenSSL Security Advisory (3rd May 2016)</italic>. Retrieved June 5, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.openssl.org/news/secadv/20160503.txt">https://www.openssl.org/news/secadv/20160503.txt</ext-link></mixed-citation></ref>
<ref id="r12"><mixed-citation>OpenSSL. (2016b). <italic>Cryptography and SSL/TLS toolkit: Downloads</italic>. Retrieved June 10, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.openssl.org/source">https://www.openssl.org/source</ext-link></mixed-citation></ref>
<ref id="r13"><mixed-citation>OpenSSL. (2016c). <italic>Cryptography and SSL/TLS toolkit: Vulnerabilities.</italic> Retrieved October 7, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.openssl.org/news/vulnerabilities.html">https://www.openssl.org/news/vulnerabilities.html</ext-link></mixed-citation></ref>
<ref id="r14"><mixed-citation>Qualis SSL Labs. (2016). <italic>SSL server test</italic>. Retrieved June 12, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.ssllabs.com/ssltest">https://www.ssllabs.com/ssltest</ext-link></mixed-citation></ref>
<ref id="r15"><mixed-citation>Rouse, M. (2014). Secure sockets layer (SSL). <italic>TechTarget Search Security</italic>. Retrieved June 10, 2016, from <ext-link ext-link-type="uri" xlink:href="http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL">http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL</ext-link></mixed-citation></ref>
<ref id="r16"><mixed-citation>Symantec. (2016). <italic>ISTR: Internet Security Threat Report</italic>, <italic>vol 21</italic>. Retrieved November 23, 2016, from <ext-link ext-link-type="uri" xlink:href="https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf">https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf</ext-link></mixed-citation></ref>
<ref id="r17"><mixed-citation>&#x0160;ili&#x0107;, M., Krolo, J., &#x0026; Dela&#x010D;, G. (2010). Security vulnerabilities in modern web browser architecture. In <italic>MIPRO, 2010 Proceedings of the 33rd International Convention</italic> (pp. 1240&#x2013;1245). Red Hook, NY: Curran Associates.</mixed-citation></ref>
<ref id="r18"><mixed-citation>University of Nottingham. (2014). <italic>The Directory of Open Access Repositories &#x2013; OpenDOAR.</italic> Retrieved June 9, 2016, from <ext-link ext-link-type="uri" xlink:href="http://www.opendoar.org">http://www.opendoar.org</ext-link></mixed-citation></ref>
</ref-list>
<fn-group>
<fn id="fn1"><p><ext-link ext-link-type="uri" xlink:href="https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf">https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf</ext-link></p></fn>
<fn id="fn2"><p>URL address of the test: <ext-link ext-link-type="uri" xlink:href="https://www.ssllabs.com/ssltest">https://www.ssllabs.com/ssltest</ext-link></p></fn>
<fn id="fn3"><p>URL address of the test: <ext-link ext-link-type="uri" xlink:href="https://www.htbridge.com/ssl">https://www.htbridge.com/ssl</ext-link></p></fn>
</fn-group>
</back>
</article>
