{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:28:12Z","timestamp":1770272892816,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540893295","type":"print"},{"value":"9783540893301","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89330-1_22","type":"book-chapter","created":{"date-parts":[[2008,11,26]],"date-time":"2008-11-26T21:43:37Z","timestamp":1227735817000},"page":"307-325","source":"Crossref","is-referenced-by-count":77,"title":["An Operational Semantics for JavaScript"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Maffeis","sequence":"first","affiliation":[]},{"given":"John C.","family":"Mitchell","sequence":"additional","affiliation":[]},{"given":"Ankur","family":"Taly","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"AdSafe: Making JavaScript safe for advertising, \n                  \n                    http:\/\/www.adsafe.org\/"},{"key":"22_CR2","unstructured":"Google-Caja, A.: source-to-source translator for securing JavaScript-based Web, \n                  \n                    http:\/\/code.google.com\/p\/google-caja\/"},{"key":"22_CR3","unstructured":"Jscript (Windows Script Technologies), \n                  \n                    http:\/\/msdn2.microsoft.com\/en-us\/library\/hbxc2t98.aspx"},{"key":"22_CR4","unstructured":"Rhino: Javascript for Java, \n                  \n                    http:\/\/www.mozilla.org\/rhino\/"},{"key":"22_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8598-9","volume-title":"A Theory of Objects","author":"M. Abadi","year":"1996","unstructured":"Abadi, M., Cardelli, L.: A Theory of Objects. Springer, Heidelberg (1996)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Adida, B.: BeamAuth: two-factor Web authentication with a bookmark. In: ACM Computer and Communications Security, pp. 48\u201357 (2007)","DOI":"10.1145\/1315245.1315253"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/11531142_19","volume-title":"ECOOP 2005 - Object-Oriented Programming","author":"C. Anderson","year":"2005","unstructured":"Anderson, C., Giannini, P., Drossopoulou, S.: Towards type inference for JavaScript. In: Black, A.P. (ed.) ECOOP 2005. LNCS, vol.\u00a03586, pp. 428\u2013452. Springer, Heidelberg (2005)"},{"key":"22_CR8","unstructured":"Eich, B.: Javascript at ten years, \n                  \n                    http:\/\/www.mozilla.org\/js\/language\/ICFP-Keynote.ppt"},{"key":"22_CR9","first-page":"3","volume":"1","author":"K. Fisher","year":"1994","unstructured":"Fisher, K., Honsell, F., Mitchell, J.C.: A lambda calculus of objects and method specialization. Nordic J. Computing (formerly BIT)\u00a01, 3\u201337 (1994)","journal-title":"Nordic J. Computing (formerly BIT)"},{"key":"22_CR10","volume-title":"JavaScript: The Definitive Guide","author":"D. Flanagan","year":"2006","unstructured":"Flanagan, D.: JavaScript: The Definitive Guide. O\u2019Reilly, Sebastopol (2006), \n                  \n                    http:\/\/proquest.safaribooksonline.com\/0596101996"},{"key":"22_CR11","unstructured":"Herman, D.: Classic JavaScript, \n                  \n                    http:\/\/www.ccs.neu.edu\/home\/dherman\/javascript\/"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Herman, D., Flanagan, C.: Status report: specifying JavaScript with ML. In: ML 2007: Proc. Workshop on ML, pp. 47\u201352 (2007)","DOI":"10.1145\/1292535.1292543"},{"key":"22_CR13","unstructured":"ECMA International. ECMAScript 4, \n                  \n                    http:\/\/www.ecmascript.org"},{"key":"22_CR14","unstructured":"ECMA International. ECMAScript language specification. stardard ECMA-262, 3rd Edition (1999), \n                  \n                    http:\/\/www.ecma-international.org\/publications\/ECMA-ST\/Ecma-262.pdf"},{"key":"22_CR15","unstructured":"Maffeis, S., Mitchell, J., Taly, A.: Complete ECMA 262-3 operational semantics and long version of present paper. Semantics: \n                  \n                    http:\/\/jssec.net\/semantics\/\n                  \n                  \n                 Paper: \n                  \n                    http:\/\/jssec.net\/semantics\/"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Mitchell, J.C.: Toward a typed foundation for method specialization and inheritance. In: POPL 1990, pp. 109\u2013124 (1990)","DOI":"10.1145\/96709.96719"},{"key":"22_CR17","unstructured":"Mozilla. Spidermonkey (javascript-c) engine, \n                  \n                    http:\/\/www.mozilla.org\/js\/spidermonkey\/"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Reis, C., Dunagan, J., Wang, H., Dubrovsky, O., Esmeir, S.: Browsershield: Vulnerability-driven filtering of dynamic HTML. ACM Transactions on the Web\u00a01(3) (2007)","DOI":"10.1145\/1281480.1281481"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-73589-2_2","volume-title":"ECOOP 2007 \u2013 Object-Oriented Programming","author":"J. Siek","year":"2007","unstructured":"Siek, J., Taha, W.: Gradual typing for objects. In: Ernst, E. (ed.) ECOOP 2007. LNCS, vol.\u00a04609, pp. 2\u201327. Springer, Heidelberg (2007)"},{"key":"22_CR20","unstructured":"The FaceBook Team. FBJS, \n                  \n                    http:\/\/wiki.developers.facebook.com\/index.php\/FBJS"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-540-31987-0_28","volume-title":"Programming Languages and Systems","author":"P. Thiemann","year":"2005","unstructured":"Thiemann, P.: Towards a type system for analyzing JavaScript programs. In: Sagiv, M. (ed.) ESOP 2005, vol.\u00a03444, pp. 408\u2013422. Springer, Heidelberg (2005)"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11601524_11","volume-title":"Database Programming Languages","author":"P. Thiemann","year":"2005","unstructured":"Thiemann, P.: A type safe DOM api. In: Bierman, G., Koch, C. (eds.) DBPL 2005. LNCS, vol.\u00a03774, pp. 169\u2013183. Springer, Heidelberg (2005)"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Ungar, D., Smith, R.B.: Self: The power of simplicity. In: Proc. OOPSLA, vol.\u00a022, pp. 227\u2013242 (1987)","DOI":"10.1145\/38765.38828"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Yu, D., Chander, A., Islam, N., Serikov, I.: JavaScript instrumentation for browser security. In: ACM POPL, pp. 237\u2013249 (2007)","DOI":"10.1145\/1190216.1190252"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89330-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T00:39:03Z","timestamp":1551659943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89330-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893295","9783540893301"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89330-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}