{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:06:28Z","timestamp":1729663588441,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/hpcsim.2015.7237042","type":"proceedings-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T21:45:56Z","timestamp":1441316756000},"page":"211-220","source":"Crossref","is-referenced-by-count":1,"title":["A survey on Information Flow Control mechanisms in web applications"],"prefix":"10.1109","author":[{"given":"Oscar","family":"Zibordi de Paiva","sequence":"first","affiliation":[]},{"given":"Wilson Vicente","family":"Ruggiero","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-642-38908-5_14","article-title":"Towards precise and efficient information flow control in web browsers","volume":"7904","author":"kerschbaumer","year":"2013","journal-title":"Trust and Trustworthy Computing Lecture Notes in Computer Science"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2093328.2093331"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2034675.2034688"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677004"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2541228.2555295"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856937"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.19"},{"key":"ref12","first-page":"319","article-title":"A perspective on information-flow control","volume":"33","author":"hedin","year":"2012","journal-title":"Software Safety and Security - Tools for Analysis and Verification ser NATO Science for Peace and Security Series - D Information and Communication Security"},{"key":"ref13","first-page":"513","article-title":"Secure computer systems: Mathematical foundations","volume":"i","author":"bell","year":"1973","journal-title":"Data Base vol"},{"key":"ref14","first-page":"66","article-title":"Integrity Considerations for Secure Computer Systems","volume":"5","author":"biba","year":"1977","journal-title":"Proc 4th Annu Symp Computer Architecture"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/269005.266669"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/978-3-642-11486-1_30","article-title":"From dynamic to static and back: Riding the roller coaster of information-flow control research","volume":"5947","author":"sabelfeld","year":"2010","journal-title":"Perspectives of Systems Informatics ser Lecture Notes in Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.03.015"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-540-74835-9_18","article-title":"Dynamic information flow control architecture for web applications","volume":"4734","author":"yoshihama","year":"2007","journal-title":"Computer Security ESORICS 2007 Ser Lecture Notes in Computer Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17714-9_5"},{"key":"ref27","first-page":"334","article-title":"Distributed middleware enforcement of event flow security policy","author":"migliavacca","year":"2010","journal-title":"Proceedings of the ACM\/IFIP\/USENIX 11th International Conference on Middleware ser Middleware '10"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2541315"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"ref8","first-page":"1","article-title":"A sound type system for secure flow analysis","author":"volpano","year":"1996","journal-title":"Journal of Computer Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"journal-title":"Application Vulnerability Trends Report","year":"2014","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268975"},{"journal-title":"Website Security Statistics Report","year":"2013","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095813"},{"key":"ref22","first-page":"1:1","article-title":"Sif: Enforcing confidentiality and integrity in web applications","author":"chong","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium Ser SS'07"},{"key":"ref21","first-page":"480","article-title":"Safeweb: A middleware for securing ruby-based web applications","author":"hosek","year":"2011","journal-title":"Proceedings of the 12th International Middleware Conference"},{"key":"ref24","first-page":"47","article-title":"Hails: Protecting data privacy in untrusted web applications","author":"giffin","year":"2012","journal-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation ser OSDI&#x2019; 12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1145\/1323293.1294293","article-title":"Information flow control for standard OS abstractions","volume":"41","author":"krohn","year":"2007","journal-title":"SIGOPS Operating Systems Review"},{"key":"ref25","first-page":"263","article-title":"Making information flow explicit in histar","author":"zeldovich","year":"2006","journal-title":"Proceedings of the 7th symposium on Operating systems design and implementation"}],"event":{"name":"2015 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2015,7,20]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2015,7,24]]}},"container-title":["2015 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7214433\/7237005\/07237042.pdf?arnumber=7237042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:54:25Z","timestamp":1498244065000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7237042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2015.7237042","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}