On the Content Security Policy Violations due to the Same-Origin Policy.
Dolière Francis SoméNataliia BielovaTamara RezkPublished in: WWW (2017)
Keyphrases
- security policies
- access control policies
- access control
- security management
- network security
- network management
- xml access control
- security concerns
- security requirements
- distributed systems
- security architecture
- digital content
- ubiquitous computing environments
- reinforcement learning
- home network
- access control systems
- data management
- event logs
- unauthorized access
- machine learning