Same origin policy

Results: 47



#Item
31Web development / Software architecture / HTML5 / Google Chrome / Web application / LastPass Password Manager / Same origin policy / HTML / Cloud computing / Computing / Software / Markup languages

Data-confined HTML5 Applications Devdatta Akhawe1 , Frank Li1 , Warren He1 , Prateek Saxena2 , and Dawn Song1 1 University of California, Berkeley, Berkeley, CA, USA 2

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 02:09:51
32United States government secrecy / Employment / Yes and no / Same-sex marriage in Canada / Government / Employment discrimination law in the United States / Human behavior / Espionage / National security / Security clearance

EMPLOYMENT APPLICATION EQUAL OPPORTUNITY EMPLOYER. It is our policy to abide by all Federal and State laws prohibiting employment discrimination solely on the basis of a person’s race, color, creed, national origin, r

Add to Reading List

Source URL: ealliant.com

Language: English - Date: 2012-10-04 20:42:02
33News aggregators / URI schemes / HTTP cookie / Internet privacy / Portable software / Same origin policy / Phishing / JavaScript / XMLHttpRequest / Software / Computing / HTTP

Beware of Finer-Grained Origins Collin Jackson Stanford University Abstract

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
34Software / Cross-site request forgery / JavaScript / Programming paradigms / Internet privacy / Same origin policy / Gmail / Scripting language / Computing / Cross-platform software / Software engineering

Same Origin Policy Weaknesses kuza55 http://kuza55.blogspot.com

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-24 09:37:56
35News aggregators / URI schemes / HTTP cookie / Internet privacy / Portable software / Same origin policy / Phishing / JavaScript / XMLHttpRequest / Software / Computing / HTTP

Beware of Finer-Grained Origins Collin Jackson Stanford University [removed] Abstract

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2008-07-03 18:00:28
36Cloud standards / HTTP / Ajax / Cross-site scripting / Cross-site request forgery / HTTP cookie / OAuth / XMLHttpRequest / Same origin policy / Computing / JavaScript / Web development

Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-08-15 09:20:17
37Mozilla / Ruhr University Bochum / Software / Free software / Firefox

Origin Policy Enforcement in Modern Browsers A Case Study in Same Origin Implementations Frederik Braun Frederik Braun (Ruhr-Uni Bochum/Mozilla)

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-03 17:47:48
38JSON / Remote procedure call / XMLHttpRequest / Serialization / Same origin policy / Ajax / Computing / JavaScript

Microsoft PowerPoint - Zyp_KrisP_Advanced_JSON.ppt

Add to Reading List

Source URL: ajaxexperience.techtarget.com

Language: English - Date: 2007-10-22 15:40:11
39

Bypassing Same Origin Policy Simon Egli, IT Security Analyst Compass Security AG Glärnischstrasse 7

Add to Reading List

Source URL: www.csnc.ch

- Date: 2015-02-10 04:35:26
    40Cross-platform software / Computer network security / HTTP / Internet privacy / Cross-site request forgery / Cross-site scripting / HTTP cookie / JavaScript / Same origin policy / Computing / Software / Computer security

    DEMACRO: Defense against Malicious Cross-domain Requests Sebastian Lekies1 , Nick Nikiforakis2 , Walter Tighzert1 , Frank Piessens2 , and Martin Johns1 1

    Add to Reading List

    Source URL: www.securitee.org

    Language: English - Date: 2013-01-01 13:05:45
    UPDATE