{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:34:36Z","timestamp":1725467676941},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647324"},{"type":"electronic","value":"9783540691013"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0053720","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T10:57:43Z","timestamp":1152183463000},"page":"48-57","source":"Crossref","is-referenced-by-count":2,"title":["Covert distributed computing using Java through Web Spoofing"],"prefix":"10.1007","author":[{"given":"Jeffrey","family":"Horton","sequence":"first","affiliation":[]},{"given":"Jennifer","family":"Seberry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"S. R. White. Covert Distributed Processing With Computer Viruses. In Advances in Cryptology \u2014 Crypto '89 Proceedings, pages 616\u2013619, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_57"},{"key":"5_CR2","unstructured":"Sun Microsystems. The Java\u2133 Language: An Overview. See http: \/\/java.sun.com\/docs\/overviews\/java\/java-overview-1.html [URL valid at 9 Feb. 1998]."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Frederick B. Cohen. Internet holes: 50 ways to attack your web systems. Network Security, December 1995. See also http:\/\/all.net\/journal\/netsec\/9512.html [URL valid at 20 Apr. 1998]","DOI":"10.1016\/1353-4858(96)89770-4"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/0167-4048(96)89323-0","volume":"15","author":"F. B. Cohen","year":"1996","unstructured":"Frederick B. Cohen. A Note on Distributed Coordinated Attacks. Computers & Security, 15:103\u2013121, 1996.","journal-title":"Computers & Security"},{"key":"5_CR5","unstructured":"Edward W. Feiten, Drew Dean and Dan S. Wallach. Java Security: From HotJava to Netscape and Beyond. In IEEE Symposium on Security and Privacy, 1996. See also http:\/\/www.cs.princeton.edu\/sip\/pub\/secure96.html [URL valid at 9 Feb. 1998]"},{"key":"5_CR6","unstructured":"Drew Dean, Edward W. Feiten, Dirk Balfanz and Dan S. Wallach. Web spoofing: An Internet Con Game. Technical report 540-96, Department of Computer Science, Princeton University, 1997. In 20th National Information Systems Security Conference (Baltimore, Maryland), October, 1997. See also http:\/\/www.cs.princeton.edu\/sip\/pub\/spoofing.html [URL valid at 9 Feb. 1998]"},{"key":"5_CR7","unstructured":"Gary McGraw and Edward W. Feiten. Java Security: Hostile Applets, Holes, and Antidotes. John Wiley & Sons, Inc., 1997."},{"key":"5_CR8","unstructured":"M. D. LaDue. Hostile Applets on the Horizon. See http:\/\/www.rstcorp.com\/hostile-applets\/HostileArticle.html [URL valid at 12 Feb. 1998]."},{"key":"5_CR9","unstructured":"RFC 1945 \u201cHypertext Transfer Protocol \u2014 HTTP\/1.0\u201d. See http:\/\/www.w3.org\/Protocols\/rfc1945\/rfc1945 [URL valid at 9 Feb. 1998]."},{"key":"5_CR10","unstructured":"RFC 2068 \u201cHypertext Transfer Protocol \u2014 HTTP\/1.1\u201d. See http:\/\/www.w3.org\/Protocols\/rfc2068\/rfc2068 [URL valid at 9 Feb. 1998]."},{"key":"5_CR11","unstructured":"Sun Microsystems White Paper. Java Remote Method Invocation \u2014 Distributed Computing For Java. See http:\/\/www.javasoft.com\/marketing\/collateral\/javarmi.html [URL valid at 9 Feb. 1998]."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T17:22:14Z","timestamp":1555694534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647324","9783540691013"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0053720","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}