Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives | IEEE Journals & Magazine | IEEE Xplore