Encyclopedia of Cryptography and Security

2011 Edition
| Editors: Henk C. A. van Tilborg, Sushil Jajodia

Security for Mashups

  • Sachiko Yoshihama
Reference work entry
DOI: https://doi.org/10.1007/978-1-4419-5906-5_660

Related Concepts

Definition

Security for mashups involves technologies or methods that allow integrating data or services from different sources, while protecting the security of each Web application or service from each other.

Background

Mashup is a technique for Web applications that integrates data or functions from different sources to create a new service. An example of a mashup application is a Web-based restaurant guide, which integrates an online map service to show the locations of the restaurants, combined with blog entries that provide reviews of those restaurants. The mashup approach allows creating new applications by leveraging content and services in existing Web sites.

However, a mashup application may pose new security risks, because typical mashup applications integrate into single Web page content and services from locations with different trust levels. Hence, if any of the sources have malicious intent, then that source...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Jackson C, Wang H (2007) Subspace: secure cross-domain communication for Web mashups. 16th International World Wide Web Conference (WWW ’07). Banff, Alberta, Canada, May 8–12, 2007Google Scholar
  2. 2.
    Keukelaere FD, Bhola S, Steiner M, Chari S, Yoshihama S (2008) SMash: secure component model for cross-domain mashups on unmodified browsers. 17th International World Wide Web Conference (WWW ’08). Beijing, China, April 25–28, 2008Google Scholar
  3. 3.
  4. 4.
  5. 5.
    XMLHttpRequest Level 2, http://www.w3.org/TR/XMLHttpRequest2/
  6. 6.
    Cross-Origin Resource Sharing, W3C Working Draft 17 March 2009, http://www.w3.org/TR/access-control/
  7. 7.
  8. 8.
    Microsoft, Better Ajax Development: Windows® Internet Explorer® 8. Whitepaper, March 2008Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Sachiko Yoshihama
    • 1
  1. 1.IBM Research-TokyoYamatoJapan