{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T16:19:32Z","timestamp":1648743572252},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s11623-012-0090-x","type":"journal-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T04:49:18Z","timestamp":1334638158000},"page":"231-235","source":"Crossref","is-referenced-by-count":0,"title":["HTML5-Security"],"prefix":"10.1007","volume":"36","author":[{"given":"Martin","family":"Johns","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,18]]},"reference":[{"key":"90_CR1","unstructured":"Michal Zalewski, The Tangled Web: A Guide to Securing Modern Web Applications, No Starch Press, November 2011"},{"key":"90_CR2","unstructured":"Jesse Ruderman, The same origin policy. [online], \n                    https:\/\/developer.mozilla.org\/En\/Same_origin_policy_for_JavaScript\n                    \n                  , August 2001."},{"key":"90_CR3","unstructured":"Ian Hickson, Web storage. W3C Working Draft, [online], \n                    http:\/\/www.w3.org\/TR\/webstorage\/"},{"key":"90_CR4","unstructured":"The Open Web Application Project (OWASP), Cross-site Scripting (XSS), [online], \n                    https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_(XSS)"},{"key":"90_CR5","unstructured":"Steve Souders, Storager case study: Bing, Google, [online], \n                    http:\/\/www.stevesouders.com\/blog\/2011\/03\/28\/storager-case-study-bing-google\/\n                    \n                  , M\u00e4rz 2011"},{"key":"90_CR6","unstructured":"Steve Hanna, Eui Chul, Richard Shin, Devdatta Akhawe, Arman Boehm, Prateek Saxena und Dawn Song. The emperor\u2019s new apis: On the (in) secure usage of new client-side primitives. In Web 2.0 Security and Privacy (W2SP 2010), 2010."},{"key":"90_CR7","unstructured":"Artur Janc. 28c3: Rootkits in your Web application. Vortrag auf der 28C3 Konferenz, \n                    http:\/\/events.ccc.de\/congress\/2011\/Fahrplan\/events\/4811.en.html\n                    \n                  , Dezember 2011."},{"key":"90_CR8","unstructured":"Eric Shepherd. window.postMessage. [online], \n                    https:\/\/developer.mozilla.org\/en\/DOM\/window.postMessage"},{"key":"90_CR9","unstructured":"Sebastian Lekies, Martin Johns und Walter Tighzert. The state of the crossdomain nation. In Proceedings of the 5th Workshop on Web 2.0 Security and Privacy (W2SP), 2011."},{"key":"90_CR10","unstructured":"Anne van Kesteren (Editor). Cross-Origin Resource Sharing. W3C Working Draft, \n                    http:\/\/www.w3.org\/TR\/cors\/\n                    \n                  , July 2010."},{"key":"90_CR11","unstructured":"Lavakumar Kuppan. Attacking with HTML5. Vortrag auf der Black Hat Abu Dhabi Konferenz, \n                    https:\/\/media.blackhat.com\/bh-ad-10\/Kuppan\/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-slides.pdf\n                    \n                  , October 2010."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0090-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0090-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0090-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0090-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:21:07Z","timestamp":1559413267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0090-x"}},"subtitle":["Sicherer Umgang mit den neuen JavaScript APIs"],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["90"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0090-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4]]}}}