{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:59:29Z","timestamp":1742918369849,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-540-93851-4_2","type":"book-chapter","created":{"date-parts":[[2009,1,13]],"date-time":"2009-01-13T02:18:17Z","timestamp":1231813097000},"page":"3-14","source":"Crossref","is-referenced-by-count":3,"title":["Itinerary Planner: A Mashup Case Study"],"prefix":"10.1007","author":[{"given":"Shyam","family":"Govardhan","sequence":"first","affiliation":[]},{"given":"George","family":"Feuerlicht","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"http:\/\/www.oreillynet.com\n                    \n                    \n                  , O\u2019Reilly \u2013 What Is Web 2.0 (2008) (cited 30 January 2008), \n                    \n                      http:\/\/www.oreillynet.com\/pub\/a\/oreilly\/tim\/news\/2005\/09\/30\/what-is-web-20.html?page=1","key":"2_CR1"},{"key":"2_CR2","volume-title":"GeoComputation 2000","author":"L. Zhao","year":"2000","unstructured":"Zhao, L.: Integrating rank correlation techniques with GIS for marketing analysis. In: GeoComputation 2000. University of Greenwich, United Kingdom (2000)"},{"issue":"4","key":"2_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1142958.1142972","volume":"31","author":"M. Doernhoefer","year":"2006","unstructured":"Doernhoefer, M.: JavaScript. SIGSOFT Softw. Eng. Notes\u00a031(4), 16\u201324 (2006)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"unstructured":"Wikipedia Single page application [cited 2007], \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Single_page_application","key":"2_CR4"},{"key":"2_CR5","volume-title":"Companion to the proceedings of the 29th International Conference on Software Engineering","author":"A. Mesbah","year":"2007","unstructured":"Mesbah, A.: Ajaxifying Classic Web Applications. In: Companion to the proceedings of the 29th International Conference on Software Engineering. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"10","key":"2_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1113322.1113330","volume":"3","author":"G. Neville-Neil","year":"2005","unstructured":"Neville-Neil, G.: Vicious XSS. Queue\u00a03(10), 12\u201315 (2005)","journal-title":"Queue"},{"key":"2_CR7","volume-title":"Enterprise Ajax","author":"D. Johnson","year":"2008","unstructured":"Johnson, D., White, A., Charland, A.: Enterprise Ajax, 1st edn. Prentice Hall, Englewood Cliffs (2008)","edition":"1"},{"key":"2_CR8","volume-title":"Proceedings of the 16th international conference on World Wide Web","author":"I. Fette","year":"2007","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th international conference on World Wide Web. ACM Press, Banff (2007)"},{"key":"2_CR9","volume-title":"Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages","author":"D. Yu","year":"2007","unstructured":"Yu, D., et al.: JavaScript instrumentation for browser security. In: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM Press, Nice (2007)"},{"unstructured":"Chess, B., Tsipenyuk O\u2019Neil, Y., West, J.: JavaScript Hijacking (2007)","key":"2_CR10"},{"unstructured":"www.ics.uci.edu\n                    \n                    \n                  , Architectural Styles and the Design of Network-based Software Architectures (2002) [cited 31 January 2008], \n                    \n                      http:\/\/www.ics.uci.edu\/~fielding\/pubs\/dissertation\/top.htm","key":"2_CR11"},{"issue":"2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1237500.1237504","volume":"10","author":"K. Bhargavan","year":"2007","unstructured":"Bhargavan, K., et al.: Secure sessions for Web services. ACM Trans. Inf. Syst. Secur.\u00a010(2), 8 (2007)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"unstructured":"A Note on JavaScript Hijacking (2007), \n                    \n                      http:\/\/dojotoolkit.org\/node\/619","key":"2_CR13"},{"unstructured":"Performance Optimization (2007), \n                    \n                      http:\/\/dojotoolkit.org\/book\/dojo-book-0-4\/part-6-customizing-dojo-builds-better-performance\/performance-optimization","key":"2_CR14"},{"unstructured":"Improving performance of Dojo-based web applications (2007), \n                    \n                      http:\/\/lazutkin.com\/blog\/2007\/feb\/1\/improving-performance\/","key":"2_CR15"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-93851-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T18:16:58Z","timestamp":1551723418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-93851-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540749738","9783540749745"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-93851-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}