Login / Signup
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy.
Akash Agrawall
Shubh Maheshwari
Projit Bandyopadhyay
Venkatesh Choppella
Published in:
ICISS (2017)
Keyphrases
</>
identity management
database
databases
artificial intelligence
digital libraries
data analysis
search space
video content
countermeasures