{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:28Z","timestamp":1755838408387,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662459164"},{"type":"electronic","value":"9783662459171"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45917-1_1","type":"book-chapter","created":{"date-parts":[[2014,12,22]],"date-time":"2014-12-22T14:34:17Z","timestamp":1419258857000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Information Flow Monitor for a Core of\u00a0DOM"],"prefix":"10.1007","author":[{"given":"Ana","family":"Almeida-Matos","sequence":"first","affiliation":[]},{"given":"Jos\u00e9","family":"Fragoso Santos","sequence":"additional","affiliation":[]},{"given":"Tamara","family":"Rezk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,23]]},"reference":[{"key":"1_CR1","unstructured":"The 5th edition of ECMA 262 June 2011: ECMAScript Language Specification. Technical report, ECMA (2011)"},{"key":"1_CR2","unstructured":"Almeida Matos, A., Fragoso Santos, J., Rezk, T.: An IF monitor for a core of DOM. http:\/\/web.ist.utl.pt\/~ana.matos\/14-AFR-if+monitor+coredom-full.pdf"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: PLAS (2009)","DOI":"10.1145\/1554339.1554353"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS (2010)","DOI":"10.1145\/1814217.1814220"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: POPL (2012)","DOI":"10.1145\/2103656.2103677"},{"key":"1_CR6","unstructured":"Banerjee, A., Naumann, D.A.: Secure information flow and pointer confinement in a Java-like language. In: CSFW (2002)"},{"key":"1_CR7","unstructured":"Gardner, P., Smith, Wheelhouse, M.J., Zarfaty, U.: DOM: Towards a formal specification. In: PLAN-X (2008)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Le Guernic, G.: Confidentiality Enforcement Using Dynamic Information Flow Analyses. PhD thesis, Kansas State University (2007)","DOI":"10.1007\/978-3-540-76929-3_4"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Hedin, D., Birgisson, B., Bello, L., Sabelfeld, A.: Jsflow: Tracking information flow in JavaScript and its APIs. In: SAC (2014)","DOI":"10.1145\/2554850.2554909"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Hedin, D., Sabelfeld, A.: Information-flow security for a core of JavaScript. In: CSF (2012)","DOI":"10.1109\/CSF.2012.19"},{"key":"1_CR11","unstructured":"W3C Recommendation. DOM: Document Object Model (DOM). Technical report, W3C (2005)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. static flow-sensitive security analysis. In: CSF (2010)","DOI":"10.1109\/CSF.2010.20"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-642-04444-1_6","volume-title":"Computer Security \u2013 ESORICS 2009","author":"A Russo","year":"2009","unstructured":"Russo, A., Sabelfeld, A., Chudnov, A.: Tracking Information Flow in Dynamic Tree Structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86\u2013103. Springer, Heidelberg (2009)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/978-3-642-11486-1_30","volume-title":"Perspectives of Systems Informatics","author":"A Sabelfeld","year":"2010","unstructured":"Sabelfeld, A., Russo, A.: From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research. In: Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. LNCS, vol. 5947, pp. 352\u2013365. Springer, Heidelberg (2010)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Shroff, P., Smith, S.F., Thober, M.: Dynamic dependency monitoring to secure information flow. In: CSF (2007)","DOI":"10.1109\/CSF.2007.20"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/11935308_24","volume-title":"Information and Communications Security","author":"VN Venkatakrishnan","year":"2006","unstructured":"Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably Correct Runtime Enforcement of Non-interference Properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332\u2013351. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45917-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T07:17:35Z","timestamp":1675840655000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-45917-1_1"}},"subtitle":["Introducing References and Live Primitives"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662459164","9783662459171"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45917-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"23 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}