ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Strenghtening Content Security Policy via Monitoring and URL Parameters Filtering
Proceedings of the 19th Workshop on Privacy in the Electronic Society
◽
10.1145/3411497.3420222
◽
2020
◽
Author(s):
Dolière Francis Somé
◽
Tamara Rezk
Keyword(s):
Security Policy
◽
Content Security
Download Full-text
Related Documents
Cited By
References
On the Content Security Policy Violations due to the Same-Origin Policy
Proceedings of the 26th International Conference on World Wide Web - WWW '17
◽
10.1145/3038912.3052634
◽
2017
◽
Cited By ~ 5
Author(s):
Dolière Francis Some
◽
Nataliia Bielova
◽
Tamara Rezk
Keyword(s):
Security Policy
◽
Content Security
◽
Same Origin Policy
Download Full-text
Automatic generation of Content Security Policy to mitigate cross site scripting
2016 2nd International Conference on Science in Information Technology (ICSITech)
◽
10.1109/icsitech.2016.7852656
◽
2016
◽
Author(s):
Samer Attallah Mhana
◽
Jamilah Binti Din
◽
Rodziah Binti Atan
Keyword(s):
Security Policy
◽
Automatic Generation
◽
Content Security
◽
Cross Site
Download Full-text
A systematic study of content security policy in web applications
Security and Communication Networks
◽
10.1002/sec.1562
◽
2016
◽
Vol 9
(16)
◽
pp. 3570-3584
◽
Cited By ~ 1
Author(s):
Shukai Liu
◽
Xuexiong Yan
◽
Qingxian Wang
◽
Qi Xi
Keyword(s):
Systematic Study
◽
Security Policy
◽
Web Applications
◽
Content Security
Download Full-text
Adopting Strict Content Security Policy for XSS Protection
2016 IEEE Cybersecurity Development (SecDev)
◽
10.1109/secdev.2016.039
◽
2016
◽
Cited By ~ 1
Author(s):
Lukas Weichselbaum
◽
Michele Spagnuolo
◽
Artur Janc
Keyword(s):
Security Policy
◽
Content Security
Download Full-text
Content Security Policy (CSP) as countermeasure to Cross Site Scripting (XSS) attacks
2017 15th International Conference on Emerging eLearning Technologies and Applications (ICETA)
◽
10.1109/iceta.2017.8102476
◽
2017
◽
Author(s):
Ivan Dolnak
Keyword(s):
Security Policy
◽
Content Security
◽
Cross Site
Download Full-text
Combating Clickjacking Using Content Security Policy and Aspect Oriented Programming
Advances in Computer and Computational Sciences - Advances in Intelligent Systems and Computing
◽
10.1007/978-981-10-3773-3_32
◽
2017
◽
pp. 323-331
Author(s):
Rakhi Sinha
◽
Dolly Uppal
◽
Rakesh Rathi
◽
Kushal Kanwar
Keyword(s):
Security Policy
◽
Aspect Oriented Programming
◽
Content Security
Download Full-text
Script-templates for the Content Security Policy
Journal of Information Security and Applications
◽
10.1016/j.jisa.2014.03.007
◽
2014
◽
Vol 19
(3)
◽
pp. 209-223
◽
Cited By ~ 9
Author(s):
Martin Johns
Keyword(s):
Security Policy
◽
Content Security
Download Full-text
Mocha: Automatically Applying Content Security Policy to HTML Hybrid Application on Android Device
2017 Fifth International Symposium on Computing and Networking (CANDAR)
◽
10.1109/candar.2017.48
◽
2017
◽
Author(s):
Toshiki Takeuchi
◽
Koichi Mouri
◽
Shoichi Saito
Keyword(s):
Security Policy
◽
Content Security
Download Full-text
Combating Clickjacking using Content Security Policy and Aspect Oriented Programming
International Journal of Security Technology for Smart Device
◽
10.21742/ijstsd.2015.2.1.02
◽
2015
◽
Vol 2
(1)
◽
pp. 11-20
Author(s):
Rakhi Sinha
◽
◽
Dolly Uppal
◽
Rakesh Rathi
◽
◽
...
Keyword(s):
Security Policy
◽
Aspect Oriented Programming
◽
Content Security
Download Full-text
Initial Assignment for the Content Security Policy Directives Registry
10.17487/rfc7762
◽
2016
◽
Author(s):
M. West
Keyword(s):
Security Policy
◽
Initial Assignment
◽
Content Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close