{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:29:39Z","timestamp":1742912979716,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176159"},{"type":"electronic","value":"9783642176166"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17616-6_27","type":"book-chapter","created":{"date-parts":[[2010,12,29]],"date-time":"2010-12-29T03:20:57Z","timestamp":1293592857000},"page":"294-307","source":"Crossref","is-referenced-by-count":2,"title":["Crowdsourced Web Augmentation: A Security Model"],"prefix":"10.1007","author":[{"given":"Crist\u00f3bal","family":"Arellano","sequence":"first","affiliation":[]},{"given":"Oscar","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Iturrioz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Greasemonkey Homepage, http:\/\/www.greasespot.net\/"},{"key":"27_CR2","unstructured":"Monkey patch, http:\/\/en.wikipedia.org\/wiki\/Monkey_patch"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Bouvin, N.O.: Unifying Strategies for Web Augmentation. In: Proceedings of the 10th ACM Conference on Hypertext and Hypermedia, HYPERTEXT 1999 (1999)","DOI":"10.1145\/294469.294493"},{"key":"27_CR4","unstructured":"Microsoft Corp. Microsoft Web Sandbox, http:\/\/websandbox.livelabs.com\/"},{"key":"27_CR5","unstructured":"Microsoft Corp. Microsoft Web Sandbox: QoS Layer, http:\/\/websandbox.livelabs.com\/documentation\/vm_qos.aspx"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"D\u00edaz, O., Arellano, C., Iturrioz, J.: Layman Tuning of Websites: Facing Change Resilience. In: The 17th International Conference on World Wide Web, WWW 2008 (2008)","DOI":"10.1145\/1367497.1367689"},{"key":"27_CR7","unstructured":"Dojo. Secure Mashups with dojox.secure, http:\/\/www.sitepen.com\/blog\/2008\/08\/01\/secure-mashups-with-dojoxsecure\/"},{"key":"27_CR8","first-page":"295","volume-title":"AJAX Security, ch. 11","author":"B. Hoffman","year":"2007","unstructured":"Hoffman, B., Sullivan, B.: Web Mashups and Aggregators. In: AJAX Security, ch. 11, pp. 295\u2013327. Addison-Wesley, Reading (2007)"},{"key":"27_CR9","unstructured":"Facebook Inc. Apps on Facebook, http:\/\/developers.facebook.com\/docs\/guides\/canvas\/"},{"key":"27_CR10","unstructured":"Google Inc. Google Caja: A source-to-source translator for securing Javascript-based web content, http:\/\/code.google.com\/p\/google-caja\/"},{"key":"27_CR11","unstructured":"JCP. JSR 168: Portlet Specification Version 1.0 (2003), http:\/\/www.jcp.org\/en\/jsr\/detail?id=168"},{"key":"27_CR12","volume-title":"Essential Facebook Development: Build Successful Applications for the Facebook Platform","author":"J. Maver","year":"2009","unstructured":"Maver, J., Popp, C.: Essential Facebook Development: Build Successful Applications for the Facebook Platform. Addison-Wesley, Reading (2009)"},{"key":"27_CR13","unstructured":"M\u00f6ller, K., Bechhofer, S., Heath, T.: Semantic Web Conference Ontology (2007), http:\/\/data.semanticweb.org\/ns\/swc\/ontology"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Scacchi, W.: Computer Game Mods, Modders, Modding, and the Mod Scene. First Monday\u00a015 (2010)","DOI":"10.5210\/fm.v15i5.2965"},{"key":"27_CR15","unstructured":"Smith, M.K., Welty, C., McGuinness, D.L.: OWL Web Ontology Language Guide. W3C Recommendation (2004), http:\/\/www.w3.org\/TR\/owl-guide\/"},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MS.1999.776944","volume":"16","author":"J. Voas","year":"1999","unstructured":"Voas, J.: Certification: Reducing the Hidden Costs of Poor Quality. IEEE Software\u00a016, 22\u201325 (1999)","journal-title":"IEEE Software"},{"key":"27_CR17","unstructured":"W3CDOMWG. W3C DOM Level 2, http:\/\/www.w3.org\/DOM\/DOMTR#dom2"},{"key":"27_CR18","unstructured":"W3CHTML5WG. HTML5, http:\/\/www.w3.org\/TR\/html5\/"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MIC.2008.114","volume":"12","author":"J. Yu","year":"2008","unstructured":"Yu, J., Benatallah, B., Casati, F., Daniel, F.: Understanding Mashup Development. IEEE Internet Computing\u00a012, 44\u201352 (2008)","journal-title":"IEEE Internet Computing"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17616-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T06:40:29Z","timestamp":1559889629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17616-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176159","9783642176166"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17616-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}