{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:52:56Z","timestamp":1743119576805,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_6","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"76-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments"],"prefix":"10.1007","author":[{"given":"R.","family":"Madhusudhan","sequence":"first","affiliation":[]},{"family":"Shashidhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"6_CR1","unstructured":"https:\/\/securityintelligence.com\/inside-the-mind-of-a-hacker-attacking-web-pages-with-cross-site-scripting"},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s00607-014-0398-5","volume":"97","author":"K Alhamazani","year":"2015","unstructured":"Alhamazani, K., et al.: An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art. Computing 97(4), 357\u2013377 (2015)","journal-title":"Computing"},{"key":"6_CR3","unstructured":"Almorsy, M., Grundy, J., M\u00fcller, I.: An analysis of the cloud computing security problem. arXiv preprint \n                  arXiv:1609.01107\n                  \n                 (2016)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Balzarotti, D., et al.: Saner: composing static and dynamic analysis to validate sanitization in web applications. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 387\u2013401. IEEE (2008)","DOI":"10.1109\/SP.2008.22"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bau, J., Bursztein, E., Gupta, D., Mitchell, J.: State of the art: automated black-box web application vulnerability testing. In: 2010 IEEE Symposium on Security and Privacy, pp. 332\u2013345. IEEE (2010)","DOI":"10.1109\/SP.2010.27"},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s00766-014-0218-7","volume":"21","author":"EB Fernandez","year":"2016","unstructured":"Fernandez, E.B., Monge, R., Hashizume, K.: Building a security reference architecture for cloud systems. Requirements Eng. 21(2), 225\u2013249 (2016)","journal-title":"Requirements Eng."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.1016\/j.protcy.2016.05.152","volume":"24","author":"G Gupta","year":"2016","unstructured":"Gupta, G.: Enhanced XSS defensive framework for web applications deployed in the virtual machines of cloud computing environment. Procedia Technol. 24, 1595\u20131602 (2016)","journal-title":"Procedia Technol."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Gupta, B., Gupta, S.: Alleviating the proliferation of JavaScript worms from online social network in cloud platforms. In: 2016 7th International Conference on Information and Communication Systems (ICICS), pp. 246\u2013251. IEEE (2016)","DOI":"10.1109\/IACS.2016.7476119"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, S., Gupta, B.: Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manag. 1\u201319 (2015)","DOI":"10.1007\/s13198-015-0376-0"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Hydara, I., Sultan, A.B.M., Zulzalil, H., Admodisastro, N.: An approach for cross-site scripting detection and removal based on genetic algorithms. In: The Ninth International Conference on Software Engineering Advances ICSEA (2014)","DOI":"10.17485\/ijst\/2015\/v8i30\/86055"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Jim, T., Swamy, N., Hicks, M.: Defeating script injection attacks with browser-enforced embedded policies. In: Proceedings of the 16th International Conference on World Wide Web, pp. 601\u2013610. ACM (2007)","DOI":"10.1145\/1242572.1242654"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: a client-side solution for mitigating cross-site scripting attacks. In: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 330\u2013337. ACM (2006)","DOI":"10.1145\/1141277.1141357"},{"key":"6_CR13","first-page":"b11","volume":"99","author":"D Mitropoulos","year":"2017","unstructured":"Mitropoulos, D., Louridas, P., Polychronakis, M., Keromytis, A.D.: Defending against web application attacks: approaches, challenges and implications. IEEE Trans. Dependable Secure Comput. 99, b11 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"6_CR14","first-page":"2","volume":"19","author":"D Mitropoulos","year":"2016","unstructured":"Mitropoulos, D., Stroggylos, K., Spinellis, D., Keromytis, A.D.: How to train your browser: preventing XSS attacks using contextual script fingerprints. ACM Trans. Priv. Secur. (TOPS) 19(1), 2 (2016)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"6_CR15","unstructured":"de Paiva, O.Z., Ruggiero, W.V.: A survey on information flow control mechanisms in web applications. In: 2015 International Conference on High Performance Computing & Simulation (HPCS), pp. 211\u2013220. IEEE (2015)"},{"key":"6_CR16","unstructured":"Saxena, P., Hanna, S., Poosankam, P., Song, D.: FLAX: systematic discovery of client-side validation vulnerabilities in rich web applications. In: NDss (2010)"},{"issue":"5","key":"6_CR17","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.infsof.2011.12.006","volume":"54","author":"LK Shar","year":"2012","unstructured":"Shar, L.K., Tan, H.B.K.: Automated removal of cross site scripting vulnerabilities in web applications. Inf. Softw. Technol. 54(5), 467\u2013478 (2012)","journal-title":"Inf. Softw. Technol."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:49:21Z","timestamp":1558396161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}