34
Views
0
CrossRef citations to date
0
Altmetric
Research Article

High level browser security in cloud computing services from cross site scripting attacks

, , , , , & show all

References

  • Wade Alcorn. Cross-site scripting viruses and worms a new attack vector. Network Security, 2006.
  • Gayatri Sakya, Vidushi Sharma. (2019) Performance evaluation of ADMC-MAC mission critical protocol for wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1407-1422. doi: https://doi.org/10.1080/09720529.2019.1692448
  • Ming Di, Shah Nazir, Fucheng Deng, Sikandar Ali. (2021) Influencing User’s Behavior Concerning Android Privacy Policy: An Overview. Mobile Information Systems 2021, pages 1-19. doi: https://doi.org/10.1155/2021/3452700
  • Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing. Soft Computing: Theories and Applications.
  • Gupta, Y., Dewan, H., & Leekha, A. (2020). Real-time monitoring using AJAX and WebSockets. Journal of Statistics and Management Systems, 23(1), 125-134. doi: https://doi.org/10.1080/09720510.2020.1714154
  • Tiwari, A., & Sharma, R. M. (2018). Realm Towards Service Optimization in Fog Computing. In Proceedings of the International Journal of Fog Computing (IJFC)” IGI Global.
  • A.E. Nunan, E. Souto, and E. Feitosa. Automatic classification of cross-site scripting in web pages using document-based and URL- based features. In Computers and Communications (ISCC), 2012.
  • Tiwari, A., Sah, M. K., & Gupta, S. (2015). Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters. Procedia Computer Science, 610-617. doi: https://doi.org/10.1016/j.procs.2015.10.050
  • R. Putthacharoen and P. Bunyatnoparat. Protecting cookies from cross site script attacks using dynamic cookies rewriting technique. In Advanced Communication Technology (ICACT), 2011.
  • Lwin Khin Shar and Hee Beng Kuan Tan. Defending against cross- site scripting attacks. Computer, 45(3):55–62, 2012. doi: https://doi.org/10.1109/MC.2011.261
  • Tiwari, A., & Sharma, R. M. (2019). Realm Towards Service Optimization in Fog Computing. International Journal of Fog Computing (IJFC), 2(2), 13-43. doi: https://doi.org/10.4018/IJFC.2019070102
  • Bo Zhou and Xuming Pan. Cookie-based cdn security authorization design. In Internet Technology and Applications (iTAP), 2011.
  • Tiwari, A., & Sharma, R. M. (2016, August). Potent cloud services utilization with efficient revised rough set optimization service parameters. In Proceedings of the International Conference on Advances in Information Communication Technology & Computing (pp. 1-7).
  • Yi Wang, Zhoujun Li, and Tao Guo. Program slicing stored xss bugs in web application. In Theoretical Aspects of Software Engineering (TASE), 2011.
  • Tiwari, A., & Sharma, R. M. (2021). OCC: A Hybrid Multiprocessing Computing Service Decision Making Using Ontology System. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), 16(4), 96-116. doi: https://doi.org/10.4018/IJWLTT.20210701.oa6
  • Saleem Riaz, Lin Hui, Mehmet Serif Aldemir, Farkhanda Afzal. (2021) A future concern of iterative learning control : A survey. Journal of Statistics and Management Systems 24:6, pages 1301-1322. doi: https://doi.org/10.1080/09720510.2020.1856421

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.