On the Content Security Policy Violations due to the Same-Origin Policy.
Dolière Francis SoméNataliia BielovaTamara RezkPublished in: CoRR (2016)
Keyphrases
- security policies
- access control policies
- access control
- security management
- xml access control
- network security
- distributed systems
- security requirements
- metadata
- network management
- security concerns
- access control systems
- ubiquitous computing environments
- security architecture
- fine grained
- optimal policy
- pervasive computing
- access control mechanism
- home network
- databases