Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,399,327 papers from all fields of science
Search
Sign In
Create Free Account
Content Security Policy
Known as:
CSP
, Content security
Content Security Policy (CSP) is a computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
40 relations
ActiveX
AngularJS
Application programming interface
Bookmarklet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
A survey on the security of multimedia contents with dual level encryption
Swapnali Anil Balshankar
,
Harshada Pacharane
,
Vicky Bobade
,
Gauri Gherde
,
U. Gaikwad
2018
Corpus ID: 53685680
The cloud computing offers high quantifiability, confidentiality and therefore the simple accessibility of the knowledge over the…
Expand
2015
2015
A More Scalable Approach to Content Centric Networking
J. Garcia-Luna-Aceves
International Conference on Computer…
2015
Corpus ID: 17605343
On-demand Content Exchange with Adaptive Naming (OCEAN) is introduced as an alternative to content centric networking approaches…
Expand
2014
2014
Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach
Mihai Doinea
,
Paul Pocatilu
2014
Corpus ID: 51948129
As in any domain that involves the use of software, the library information systems take advantages of cloud computing. The paper…
Expand
Review
2013
Review
2013
A Survey on Securing Databases From Unauthorized Users
Prof. S. S. Asole
,
Ms. S. M. Mundada
2013
Corpus ID: 1486659
: - Database and database technologies form a core component of many computing systems and applications which allow data to be…
Expand
2013
2013
Poster : UserCSP-User Specified Content Security Policies
Kailas Patil
2013
Corpus ID: 8780522
Content Security Policy (CSP) is a browser security mechanism that aims to protect websites from content injection attacks. To…
Expand
2011
2011
Secure document engineering
H. Balinsky
,
S. Simske
ACM Symposium on Document Engineering
2011
Corpus ID: 23004262
With the boom in interactive and composite documents and the increased coupling between the on-line and physical worlds, the need…
Expand
2009
2009
Multimedia security and multimedia content protection
R. Ridzon
,
D. Levický
International Symposium ELMAR
2009
Corpus ID: 36484383
The concept of the digital rights management architecture for multimedia will be presented in this paper. The DRM architecture…
Expand
2008
2008
Trusted Transmission Protocol for Content Security
Li Li
,
Guosun Zeng
,
Bo Chen
International Conference for Young Computer…
2008
Corpus ID: 15970883
Classic message exchange based on asymmetric cryptography can protect message content from tampering and authenticate terminal by…
Expand
2008
2008
Feature Selection Method of Text Tendency Classification
Yanling Li
,
Guanzhong Dai
,
Gang Li
Fifth International Conference on Fuzzy Systems…
2008
Corpus ID: 22356955
Recently, automatic text categorization has made rapid progress and been one of the hotspots in the information processing field…
Expand
Review
2006
Review
2006
Profiling and accelerating string matching algorithms in three network content security applications
Po-Ching Lin
,
Zhi-Xiang Li
,
Ying-Dar Lin
,
Y. Lai
,
F. C. Lin
IEEE Communications Surveys and Tutorials
2006
Corpus ID: 2707440
The efficiency of string matching algorithms is essential for network content security applications, such as intrusion detection…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE