{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:10:05Z","timestamp":1742955005770,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811659423"},{"type":"electronic","value":"9789811659430"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-5943-0_17","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T23:04:08Z","timestamp":1631228648000},"page":"204-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Web Application Code and Sensitive Data with Symmetric and Identity-Based Cryptosystems"],"prefix":"10.1007","author":[{"given":"Jinchao","family":"Ni","sequence":"first","affiliation":[]},{"given":"Ziyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Li","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Hanzhang","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"issue":"12","key":"17_CR1","doi-asserted-by":"publisher","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","volume":"76","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi, H., Rafsanjani, M.K.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493\u20139532 (2020). https:\/\/doi.org\/10.1007\/s11227-020-03213-1","journal-title":"J. Supercomput."},{"key":"17_CR2","unstructured":"Tawalbeh, L.A., Saldamli, G.: Reconsidering big data security and privacy in cloud and mobile cloud systems. J. King Saud Univ. \u2013 Comput. Inform. Sci. (in press). Available online 29 May 2019"},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2020","unstructured":"Khan, R., Kumar, P., Jayakody, D.N.K., Liyanage, M.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 22(1), 196\u2013248 (2020)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"17_CR4","first-page":"162","volume":"27","author":"DM Mena","year":"2018","unstructured":"Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. Inform. Security J.: Global Perspect. 27(3), 162\u2013182 (2018)","journal-title":"Inform. Security J.: Global Perspect."},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3172869","volume":"51","author":"E Toch","year":"2018","unstructured":"Toch, E., et al.: The privacy implications of cyber security systems: a technological survey. ACM Comput. Surv 51(2), 1\u201327 (2018)","journal-title":"ACM Comput. Surv"},{"issue":"2","key":"17_CR6","first-page":"852","volume":"17","author":"M Awad","year":"2019","unstructured":"Awad, M., Ali, M., Takruri, M., Ismail, S.: Security vulnerabilities related to web-based data. Telkomnika Telecommun. Comput. Electron. Control 17(2), 852\u2013856 (2019)","journal-title":"Telkomnika Telecommun. Comput. Electron. Control"},{"issue":"3","key":"17_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2013.08.007","volume":"254","author":"A Razzaq","year":"2014","unstructured":"Razzaq, A., Latif, K., Ahmad, H.F., Hur, A., Anwar, Z., Bloodsworth, P.C.: Semantic security against web application attacks. Inform. Sci. 254(3), 19\u201338 (2014)","journal-title":"Inform. Sci."},{"key":"17_CR8","unstructured":"Futoransky, A., Gutesman, E., Waissbein, A.: A dynamic technique for enhancing the security and privacy of web applications. In: Proc. of Black Hat USA, Las Vegas (2007)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Akhawe, D., Barth, A., Lam, P.E., Mitchell, J., Song, D.: Towards a formal foundation of web security. In: 2010 23rd IEEE Computer Security Foundations Symposium, Edinburgh, UK, pp. 290\u2013304 (2010)","DOI":"10.1109\/CSF.2010.27"},{"issue":"4","key":"17_CR10","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s00450-009-0092-6","volume":"24","author":"M Jensen","year":"2009","unstructured":"Jensen, M., Gruschka, N., Herkenhoener, R.: A survey of attacks on web services. Comput. Sci. Res. Dev. 24(4), 185\u2013197 (2009)","journal-title":"Comput. Sci. Res. Dev."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Wassermann, G., Su, Z: Static detection of cross-site scripting vulnerabilities. In: ICSE-ACM\/IEEE International Conference on Software Engineering, Germany, pp. 171\u2013180 (2008)","DOI":"10.1145\/1368088.1368112"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Shahriar, H., Zulkernine, M.: MUTEC: mutation-based testing of cross site scripting. In: Proc. of the 5th ICSE Workshop SESS, Vancouver, Canada, pp. 47\u201353 (2009)","DOI":"10.1109\/IWSESS.2009.5068458"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Shahriar, H., Zulkernine, M.: Injecting comments to detect JavaScript code injection attacks. In: COMPSACW-IEEE 35th Annual Computer Software & Applications Conference Workshops, IEEE, pp. 104\u2013109 (2011)","DOI":"10.1109\/COMPSACW.2011.27"},{"key":"17_CR14","unstructured":"Stark, E.: From Client-side Encryption to Secure Web Applications. Thesis. Massachusetts Institute of Technology (2013)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Dong, X., Chen, Z., Siadati, H., Tople, S., Saxena, P., Liang, Z.: Protecting sensitive web content from client-side vulnerabilities with cryptons. In: CCS 2013: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1311\u20131324 (2013)","DOI":"10.1145\/2508859.2516743"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Tople, S., Shinde, S., Chen, Z., Saxena, P.: AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content. In: CCS 2013: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1297\u20131310 (2013)","DOI":"10.1145\/2508859.2516666"},{"issue":"5","key":"17_CR17","first-page":"595","volume":"7","author":"R Wei","year":"2020","unstructured":"Wei, R., Zheng, F.Y., Lin, J.Q.: Implementation of a general-purpose cryptography library supporting domestic algorithm with JavaScript. J. Cryptologic Res 7(5), 595\u2013604 (2020)","journal-title":"J. Cryptologic Res"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-49100-4_5","volume-title":"Security Standardisation Research","author":"K Cairns","year":"2016","unstructured":"Cairns, K., Halpin, H., Steel, G.: Security Analysis of the W3C Web Cryptography API. In: Chen, L., McGrew, D., Mitchell, C. (eds.) SSR 2016. LNCS, vol. 10074, pp. 112\u2013140. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49100-4_5"},{"key":"17_CR19","unstructured":"Sleevi, R., Watson, M.: Web cryptography API. Candidate recommendation, IETF (2014)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Halpin, H.: The W3C web cryptography API: motivation and overview. In Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion-WWWCompanion 2014, Switzerland, pp. 959\u2013964 (2014)","DOI":"10.1145\/2567948.2579224"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Stark, E., Hamburg, M., Boneh, D.: Symmetric cryptography in Javascript. In: Proceedings of the 2009 Annual Computer Security Applications Conference-ACSAC 2009, Washington, DC, USA, pp. 373\u2013381 (2009)","DOI":"10.1109\/ACSAC.2009.42"},{"key":"17_CR22","unstructured":"Matasano Security: Javascript cryptography considered harmful. http:\/\/www.matasano.com\/articles\/javascript-cryptography\/"},{"key":"17_CR23","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael. NIST AES Algorithm Submission (1999)"},{"key":"17_CR24","unstructured":"GM\/T 0002-2012: SM4 block cipher algorithm. Chinese Cryptography Standard (2012)"},{"key":"17_CR25","unstructured":"GM\/T 0003.1-0003.5-2012: Public key cryptographic algorithm SM2 based on elliptic curves. Chinese Cryptography Standard (2012)"},{"key":"17_CR26","unstructured":"National Institute of Standards and Technology: FIPS PUB 186-4: Digital Signature Standard (DSS) (2013)"},{"key":"17_CR27","unstructured":"GM\/T 0044.1-2016: Identity-based cryptographic algorithms SM9. Chinese Cryptography Standard (2012)"},{"key":"17_CR28","unstructured":"GM\/T 0004-2012: SM3 cryptographic hash algorithm. Chinese Cryptography Standard (2012)"},{"issue":"4","key":"17_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00237-5","volume":"1","author":"P Phung","year":"2020","unstructured":"Phung, P., Pham, Huu-Danh., Armentrout, J., Hiremath, P., Tran-Minh, Q.: A user-oriented approach and tool for security and privacy protection on the web. SN Comput. Sci. 1(4), 1\u201316 (2020). https:\/\/doi.org\/10.1007\/s42979-020-00237-5","journal-title":"SN Comput. Sci."},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"74941","DOI":"10.1109\/ACCESS.2019.2920675","volume":"7","author":"H Shimamoto","year":"2019","unstructured":"Shimamoto, H., Yanai, N., Okamura, S., Cruz, J.P., Okubo, T.: Towards further formal foundation of web security: expression of temporal logic in alloy and its application to a security model with cache. IEEE Access 7, 74941\u201374960 (2019)","journal-title":"IEEE Access"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Figueiredo, A., Lide, T., Matos, D., Correia, M.: MERLIN: multi-language web vulnerability detection. In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), IEEE, pp. 1\u20139 (2020)","DOI":"10.1109\/NCA51143.2020.9306735"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Caturano, F., Perrone, G., Romano, S.P.: Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment. Comput. Security 103 (2021)","DOI":"10.1016\/j.cose.2021.102204"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Mohammadi, M., Chu, B., Lipford, H.R.: Automated repair of cross-site scripting vulnerabilities through unit testing. In: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), IEEE (2019)","DOI":"10.1109\/ISSREW.2019.00098"},{"key":"17_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., Van Oorschot, P.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 250\u2013270. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36492-7_17"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-5943-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:51:26Z","timestamp":1710348686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-5943-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811659423","9789811659430"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-5943-0_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.icpcsee.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"256","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}