{"id":638,"date":"2007-05-14T14:31:44","date_gmt":"2007-05-14T19:31:44","guid":{"rendered":"http:\/\/www.ashleyit.com\/blogs\/brentashley\/?p=638"},"modified":"2007-05-14T14:33:36","modified_gmt":"2007-05-14T19:33:36","slug":"one-practical-real-world-solution-to-secure-mashups","status":"publish","type":"post","link":"https:\/\/ashleyit.com\/blogs\/brentashley\/2007\/05\/14\/one-practical-real-world-solution-to-secure-mashups\/","title":{"rendered":"One practical real-world solution to Secure Mashups"},"content":{"rendered":"<p>Dion Almaer <a href=\"http:\/\/ajaxian.com\/archives\/subspace-enabling-trusted-cross-domain-ajax\">points us<\/a> to a <a href=\"http:\/\/www2007.org\/program\/paper.php?id=801\">recently released paper [pdf]<\/a> from <a href=\"http:\/\/www.collinjackson.com\/\">Collin Jackson<\/a> and <a href=\"http:\/\/research.microsoft.com\/~helenw\/\">Helen Wang<\/a> introducing their research into a new method of Secure Cross-Domain Communication for Web Mashups.<\/p>\n<p>The method is designed to provide secure cross-domain scripting using the tools that are available now, so we don&#8217;t have to wait for the next generation of browsers to provide purpose-built mechanisms.<\/p>\n<p>Collin and Helen, along with some other Microsoft colleagues, have also authored another paper entitled <a href=\"http:\/\/research.microsoft.com\/~helenw\/papers\/mashupOSHotOS.pdf\">MashupOS: Operating System Abstractions for Client Mashups  [pdf]<\/a> that is worth reading.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dion Almaer points us to a recently released paper [pdf] from Collin Jackson and Helen Wang introducing their research into a new method of Secure Cross-Domain Communication for Web Mashups. The method is designed to provide secure cross-domain scripting using the tools that are available now, so we don&#8217;t have to wait for the next [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","footnotes":""},"categories":[2,1,12,11],"tags":[],"class_list":["post-638","post","type-post","status-publish","format-standard","hentry","category-ajax","category-blather","category-development","category-javascript"],"_links":{"self":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/posts\/638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/comments?post=638"}],"version-history":[{"count":0,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/posts\/638\/revisions"}],"wp:attachment":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/media?parent=638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/categories?post=638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/tags?post=638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}