Login / Signup

Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy.

Akash AgrawallShubh MaheshwariProjit BandyopadhyayVenkatesh Choppella
Published in: ICISS (2017)
Keyphrases
  • identity management
  • database
  • databases
  • artificial intelligence
  • digital libraries
  • data analysis
  • search space
  • video content
  • countermeasures