Same-origin policy

Results: 47



#Item
31Data-confined HTML5 Applications Devdatta Akhawe1 , Frank Li1 , Warren He1 , Prateek Saxena2 , and Dawn Song1 1 University of California, Berkeley, Berkeley, CA, USA 2

Data-confined HTML5 Applications Devdatta Akhawe1 , Frank Li1 , Warren He1 , Prateek Saxena2 , and Dawn Song1 1 University of California, Berkeley, Berkeley, CA, USA 2

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 02:09:51
32EMPLOYMENT APPLICATION  EQUAL OPPORTUNITY EMPLOYER. It is our policy to abide by all Federal and State laws prohibiting employment discrimination solely on the basis of a person’s race, color, creed, national origin, r

EMPLOYMENT APPLICATION EQUAL OPPORTUNITY EMPLOYER. It is our policy to abide by all Federal and State laws prohibiting employment discrimination solely on the basis of a person’s race, color, creed, national origin, r

Add to Reading List

Source URL: ealliant.com

Language: English - Date: 2012-10-04 20:42:02
33Beware of Finer-Grained Origins Collin Jackson Stanford University   Abstract

Beware of Finer-Grained Origins Collin Jackson Stanford University Abstract

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
34Same Origin Policy Weaknesses kuza55  http://kuza55.blogspot.com

Same Origin Policy Weaknesses kuza55 http://kuza55.blogspot.com

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-24 09:37:56
35Beware of Finer-Grained Origins Collin Jackson Stanford University [removed]  Abstract

Beware of Finer-Grained Origins Collin Jackson Stanford University [removed] Abstract

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2008-07-03 18:00:28
36Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London  This paper is included in the Proceedings of

Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-08-15 09:20:17
37Origin Policy Enforcement in Modern Browsers A Case Study in Same Origin Implementations Frederik Braun  Frederik Braun (Ruhr-Uni Bochum/Mozilla)

Origin Policy Enforcement in Modern Browsers A Case Study in Same Origin Implementations Frederik Braun Frederik Braun (Ruhr-Uni Bochum/Mozilla)

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-03 17:47:48
38Microsoft PowerPoint - Zyp_KrisP_Advanced_JSON.ppt

Microsoft PowerPoint - Zyp_KrisP_Advanced_JSON.ppt

Add to Reading List

Source URL: ajaxexperience.techtarget.com

Language: English - Date: 2007-10-22 15:40:11
39Bypassing Same Origin Policy  Simon Egli, IT Security Analyst Compass Security AG Glärnischstrasse 7

Bypassing Same Origin Policy Simon Egli, IT Security Analyst Compass Security AG Glärnischstrasse 7

Add to Reading List

Source URL: www.csnc.ch

- Date: 2015-02-10 04:35:26
    40DEMACRO: Defense against Malicious Cross-domain Requests Sebastian Lekies1 , Nick Nikiforakis2 , Walter Tighzert1 , Frank Piessens2 , and Martin Johns1 1

    DEMACRO: Defense against Malicious Cross-domain Requests Sebastian Lekies1 , Nick Nikiforakis2 , Walter Tighzert1 , Frank Piessens2 , and Martin Johns1 1

    Add to Reading List

    Source URL: www.securitee.org

    Language: English - Date: 2013-01-01 13:05:45