Options
Problems with same origin policy (transcript of discussion)
Publikationstyp
Conference Paper
Publikationsdatum
2011
Sprache
English
Author
Gollmann, Dieter
First published in
Number in series
6615 LNCS
Start Page
86
End Page
92
Citation
Security protocols XVI : 16th international workshop, Cambridge, UK, April 16 - 18, 2008 ; revised selected papers. - Berlin, 2011. - (Lecture Notes in Computer Science ; 6615 LNCS (): 86-92 (2011)
Contribution to Conference
Publisher DOI
Scopus ID
Publisher
Springer
Basic point, if you want to enforce the same origin policy, you have to be able to authenticate origin. In many cases, as you will see, one might be unable to do so for whatever reasons. But you might still be able to authenticate yourself, and that could be a useful security primitive, and that is one of the purposes of this talk, to discuss this security primitive of knowing yourself. I will use examples from web application security (which some of you might be much more familiar with than myself) to illustrate this point, and I could quite often refer to mobile network security, I see great similarities. © 2011 Springer-Verlag.
DDC Class
004: Informatik