Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Executive summary
1. Scope
2. Analysis results
2.1. Overview
2.2. Selection of more severe threats
2.3. Extensive Functionality Growth
2.4. Dealing with Multiple Browsing Contexts
2.5. Additional Permission Systems
2.6. Conflicting Security Controls
3. Recommendations
3.1. Controlling Functionality
3.2. Consistent Permission Systems
3.3. End User Policing
3.4. Restricted Contexts
3.5. General Recommendations
4. Security analysis
4.1. Approach
4.2. HTML5 - Elements
4.3. HTML5 - Attributes
4.4. HTML5 - Navigation
4.5. HTML5 - Application Cache
4.6. HTML5 - Browser Features
4.7. Web Messaging
4.8. XMLHttpRequest Level 1 and 2
4.9. Cross-Origin Resource Sharing
4.10. Uniform Messaging Policy
4.11. Web Storage
4.12. Geo-location API
4.13. Media Capture API
4.14. System Information API
4.15. Widgets - Digital Signatures
4.16. Widgets - Access Request Policy
0 of .
Results for:
No results containing your search query
P. 1
NG Web Security

NG Web Security

Ratings: (0)|Views: 76|Likes:
Published by belsecblog

More info:

Published by: belsecblog on Jan 09, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 21 are not shown in this preview.
You're Reading a Free Preview
Pages 25 to 62 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Simon Benjamin liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->