Cybersecurity enterprises policies: A comparative study
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …
also by national security. To safeguard an organization's cyberenvironments, information …
[PDF][PDF] Collaboro: a collaborative (meta) modeling tool
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …
daily tasks, in particular for managing research objects, like publications or datasets. The …
CSP adoption: current status and future prospects
M Ying, SQ Li - Security and Communication Networks, 2016 - Wiley Online Library
Content security policy (CSP) is a security mechanism that can be used to mitigate cross‐
site scripting (also known as XSS) and other related attacks. Although CSP is a promising …
site scripting (also known as XSS) and other related attacks. Although CSP is a promising …
[HTML][HTML] Fatal injection: A survey of modern code injection attack countermeasures
With a code injection attack (CIA) an attacker can introduce malicious code into a computer
program or system that fails to properly encode data that comes from an untrusted source. A …
program or system that fails to properly encode data that comes from an untrusted source. A …
How to train your browser: Preventing XSS attacks using contextual script fingerprints
Cross-Site Scripting (XSS) is one of the most common web application vulnerabilities. It is
therefore sometimes referred to as the “buffer overflow of the web.” Drawing a parallel from …
therefore sometimes referred to as the “buffer overflow of the web.” Drawing a parallel from …
Analysis and design of secure web services
A Saleem, AK Agarwal - Proceedings of Fifth International Conference on …, 2016 - Springer
This paper presents for the composition of software value a distributed data flow model as it
is widely distributed over the internet. These services are ruled by user and they are …
is widely distributed over the internet. These services are ruled by user and they are …
Dynamic Content Security Policy Generation at Client-Side to Mitigate XSS Attacks
RP Singh, BR Chandavarkar - 2024 15th International …, 2024 - ieeexplore.ieee.org
Cross-site scripting (XSS) attacks are a major threat to web applications and have
consistently ranked among the OWASP Top 10 vulnerabilities. Attackers can inject malicious …
consistently ranked among the OWASP Top 10 vulnerabilities. Attackers can inject malicious …
[PDF][PDF] Reviewing effectivity in security approaches towards strengthening internet architecture
MS Vidya, MC Patil - International Journal of Electrical and Computer …, 2019 - academia.edu
The usage of existing Internet architecture is shrouded by various security loopholes and
hence is highly ineffective towards resisting potential threats over internet. Hence, it is …
hence is highly ineffective towards resisting potential threats over internet. Hence, it is …
GUARDIA: specification and enforcement of javascript security policies without VM modifications
The complex architecture of browser technologies and dynamic characteristics of JavaScript
make it difficult to ensure security in client-side web applications. Browser-level security …
make it difficult to ensure security in client-side web applications. Browser-level security …
It's More Than Stealing Cookies-Exploitability of XSS
Web Application vulnerabilities are into existence since the beginning of the internet and the
world-wide web. In recent years, it has been given more importance considering the rapid …
world-wide web. In recent years, it has been given more importance considering the rapid …