{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:52:41Z","timestamp":1725594761891},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_45","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T12:41:43Z","timestamp":1309956103000},"page":"327-337","source":"Crossref","is-referenced-by-count":0,"title":["SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services"],"prefix":"10.1007","author":[{"given":"V.","family":"Shanmughaneethi","sequence":"first","affiliation":[]},{"given":"Ra. Yagna","family":"Pravin","sequence":"additional","affiliation":[]},{"given":"C. Emilin","family":"Shyni","sequence":"additional","affiliation":[]},{"given":"S.","family":"Swamynathan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","unstructured":"Security Focus, http:\/\/www.securityfocus.com"},{"key":"45_CR2","unstructured":"Anley, C.: Advanced SQL Injectio. In: SQL Server Applications. white paper, Next Generation Security Software (2002)"},{"key":"45_CR3","unstructured":"SQL Injection: are your web applications vulnerable? White Paper, HP (October 2007)"},{"key":"45_CR4","unstructured":"OWASP, Category: OWASP Top Ten Project, Vol. 2007 (2007)"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Web application security- SQL injection attacks. Network Security\u00a02006(4), 4\u20135 (2006)","DOI":"10.1016\/S1353-4858(06)70353-1"},{"issue":"4","key":"45_CR6","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/S0020-7373(85)80051-1","volume":"22","author":"Correcting user errors in SQL","year":"1985","unstructured":"Correcting user errors in SQL. International Journal of Man-Machine Studies\u00a022(4), 463\u2013477 (1985)","journal-title":"International Journal of Man-Machine Studies"},{"issue":"1","key":"45_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1353-4858(08)70007-2","volume":"2008","author":"J.B. Ullrich","year":"2008","unstructured":"Ullrich, J.B.: Chief research officer and Jason Lam Defacing websites via SQL injection. Journal of Network Security\u00a02008(1), 9\u201310 (2008)","journal-title":"Journal of Network Security"},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TSE.2007.70748","volume":"34","author":"W.G.J. Halfond","year":"2008","unstructured":"Halfond, W.G.J., Orso, A.: Member and Panagiotis Manolios, \u201c WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. IEEE Transactions on Software Engineering\u00a034(1), 65\u201381 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Su, Z., Wassermann, G.: The Essence of Command Injection Attacks in Web Applications. In: Proceedings of the Thirty Third ACM Symposium on Principles of Programming Languages, South Carolina, pp. 372\u2013382 (2006)","DOI":"10.1145\/1111037.1111070"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Buehrer, G.T., Weide, B.W., Sivilotti, P.A.G.: Using Parse Tree Validation to Prevent SQL Injection Attacks. In: SEM 2005: Proceedings of the Fifth International Workshop on Software Engineering and Middleware, New York, pp. 106\u2013113 (2005)","DOI":"10.1145\/1108473.1108496"},{"issue":"2","key":"45_CR11","first-page":"53","volume":"6","author":"G. Hermosillo","year":"2008","unstructured":"Hermosillo, G., Gomez, R., Seinturier, L., Duchien, L.: Using Aspect Programming to Secure Web Applications. Journal of Software\u00a06(2), 53\u201363 (2008)","journal-title":"Journal of Software"},{"key":"45_CR12","unstructured":"SQL Grammar, http:\/\/msdn.microsoft.com\/en-us\/library\/ms709391VS.85.aspx"},{"key":"45_CR13","unstructured":"CVE. Common Vulnerabilities and Exposures (April 2008), http:\/\/cve.mitre.org\/"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T19:50:43Z","timestamp":1560369043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}