Login / Signup
Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives.
Hossein Saiedian
Dan Broyle
Published in:
Computer (2011)
Keyphrases
</>
security vulnerabilities
intrusion detection
dos attacks
security properties
penetration testing
unauthorized access
network security
security requirements