Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives

@article{Saiedian2011SecurityVI,
  title={Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives},
  author={Hossein Saiedian and Dan Broyle},
  journal={Computer},
  year={2011},
  volume={44},
  pages={29-36}
}
The same-origin policy, a fundamental security mechanism within Web browsers, overly restricts Web application development while creating an ever-growing list of security holes, reinforcing the argument that the SOP is not an appropriate security model. 

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 10 references

Browser Applications and the Same Origin Policy,

  • J. Mischel
  • informIT,
  • 2010

Cross-Site Request Forgery: The Sleeping Giant,

  • J. Grossman
  • WhiteHat Security,
  • 2007

Arawo, “Web Application Security Assessment Tools,

  • R. M. Curphey
  • IEEE Security & Privacy, July/Aug
  • 2006

Cross-Site Scripting Worms and Viruses: The Impending Threat and the Best Defense,

  • J. Grossman
  • WhiteHat Security,
  • 2006

Session Riding: A Widespread Vulnerability in Today’s Web Applications,

  • T. Schreiber
  • SecureNet GmbH,
  • 2004

Similar Papers

Loading similar papers…