{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:20:54Z","timestamp":1725585654993},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215988"},{"type":"electronic","value":"9783642215995"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21599-5_17","type":"book-chapter","created":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T20:31:47Z","timestamp":1308083507000},"page":"231-238","source":"Crossref","is-referenced-by-count":7,"title":["Contego: Capability-Based Access Control for Web Browsers"],"prefix":"10.1007","author":[{"given":"Tongbo","family":"Luo","sequence":"first","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Crockford, D.: ADSafe, \n                    \n                      http:\/\/www.adsafe.org"},{"key":"17_CR2","unstructured":"Dalton, M., Kozyrakis, C., Zeldovich, N.: Nemesis: Preventing authentication & access control vulnerabilities inweb applications. In: Proceedings of the Eighteenth Usenix Security Symposium (Usenix Security), Montreal, Canada (2009)"},{"key":"17_CR3","unstructured":"Gundy, M.V., Chen, H.: Noncespaces: Using randomization to enforce information flow tracking and thwart cross-site scripting attacks. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2009)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Jackson, C., Bortz, A., Boneh, D., Mitchell, J.C.: Protecting browser state from web privacy attacks. In: WWW 2006 (2006)","DOI":"10.1145\/1135777.1135884"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Jayaraman, K., Du, W., Rajagopalan, B., Chapin, S.J.: Escudo: A fine-grained protection model for web browsers. In: Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS), Genoa, Italy (June 21-25, 2010)","DOI":"10.1109\/ICDCS.2010.71"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Jim, T., Swamy, N., Hicks, M.: Defeating script injection attacks with browser-enforced embedded policies. In: WWW 2007,","DOI":"10.1145\/1242572.1242654"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007 (2007)","DOI":"10.1145\/1315245.1315254"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Livshits, B., Erlingsson, U.: Using web application construction frameworks to protect against code injection attacks. In: PLAS 2007 (2007)","DOI":"10.1145\/1255329.1255346"},{"key":"17_CR9","unstructured":"Luo, T., Du., W.: Contego: Capability-based access control for web browsers (full version), \n                    \n                      http:\/\/www.cis.syr.edu\/~wedu\/Research\/paper\/contego_full.pdf"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Meyerovich, L.A., Livshits, V.B.: Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser. In: IEEE Symposium on Security and Privacy, pp. 481\u2013496 (2010)","DOI":"10.1109\/SP.2010.36"},{"key":"17_CR11","unstructured":"Nadji, Y., Saxena, P., Song, D.: Document structure integrity: A robust basis for cross-site scripting defense. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2009)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Parno, B., McCune, J.M., Wendlandt, D., Andersen, D.G., Perrig, A.: CLAMP: Practical prevention of large-scale data leaks. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA (May 2009)","DOI":"10.1109\/SP.2009.21"},{"key":"17_CR13","unstructured":"WhiteHat Security. Whitehat website security statistic report, 10th edn. (2010)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21599-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T16:20:28Z","timestamp":1553790028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21599-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215988","9783642215995"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21599-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}