Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,225,052 papers from all fields of science
Search
Sign In
Create Free Account
Content Security Policy
Known as:
CSP
, Content security
Content Security Policy (CSP) is a computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
40 relations
ActiveX
AngularJS
Application programming interface
Bookmarklet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies
S. Roth
,
Timothy Barron
,
Stefano Calzavara
,
Nick Nikiforakis
,
Ben Stock
Network and Distributed System Security Symposium
2020
Corpus ID: 210939948
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper…
Expand
2018
2018
Semantics-Based Analysis of Content Security Policy Deployment
Stefano Calzavara
,
Alvise Rabitti
,
M. Bugliesi
ACM Transactions on the Web
2018
Corpus ID: 3417941
Content Security Policy (CSP) is a recent W3C standard introduced to prevent and mitigate the impact of content injection…
Expand
2018
2018
Named Data Networking’s Intrinsic Cyber-Resilience for Vehicular CPS
S. Bouk
,
Syed Hassan Ahmed
,
Rasheed Hussain
,
Y. Eun
IEEE Access
2018
Corpus ID: 53285967
Modern vehicles equipped with a large number of electronic components, sensors, actuators, and extensive connectivity, are the…
Expand
Review
2018
Review
2018
A survey on the security of multimedia contents with dual level encryption
Swapnali Anil Balshankar
,
Harshada Pacharane
,
Vicky Bobade
,
Gauri Gherde
,
U. Gaikwad
2018
Corpus ID: 53685680
The cloud computing offers high quantifiability, confidentiality and therefore the simple accessibility of the knowledge over the…
Expand
2017
2017
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting
Samaneh Tajalizadehkhoob
,
Tom van Goethem
,
+5 authors
M. V. Eeten
Conference on Computer and Communications…
2017
Corpus ID: 10606595
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security…
Expand
2016
2016
Multi-Perspective Cost-Sensitive Context-Aware Multi-Instance Sparse Coding and Its Application to Sensitive Video Recognition
Weiming Hu
,
Xinmiao Ding
,
+4 authors
S. Maybank
IEEE transactions on multimedia
2016
Corpus ID: 206752182
With the development of video-sharing websites, P2P, micro-blog, mobile WAP websites, and so on, sensitive videos can be more…
Expand
2015
2015
A More Scalable Approach to Content Centric Networking
J. Garcia-Luna-Aceves
International Conference on Computer…
2015
Corpus ID: 17605343
On-demand Content Exchange with Adaptive Naming (OCEAN) is introduced as an alternative to content centric networking approaches…
Expand
2010
2010
Information content security on the Internet: the control model and its evaluation
Binxing Fang
,
Yunchuan Guo
,
Yuan Zhou
Science in China Series F: Information Sciences
2010
Corpus ID: 25834723
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the…
Expand
2007
2007
A Digital Rights Management Architecture for Multimedia in P2P
Cheng Yang
,
Jianbo Liu
,
Aina Sui
,
Yongbin Wang
PAKDD Workshops
2007
Corpus ID: 34200907
P2P content sharing is often blamed for copyright infringement, making the establishment of DRM technologies an urgent need. A…
Expand
2006
2006
Research on A Content-based Secure Architecture Model
Guan Jun-zhong
2006
Corpus ID: 63763774
Based on the smaller information granularity security, granule technology was presented in this paper, and the information…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE