{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:34:12Z","timestamp":1725744852131},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icccn.2013.6614169","type":"proceedings-article","created":{"date-parts":[[2013,10,31]],"date-time":"2013-10-31T00:14:00Z","timestamp":1383178440000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing"],"prefix":"10.1109","author":[{"given":"Rodney","family":"Owens","sequence":"first","affiliation":[]},{"given":"Weichao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108094"},{"journal-title":"Spl Stream Processing Language Specification","year":"2009","author":"hirzel","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992907"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273005"},{"key":"13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/352600.352607","article-title":"A protocol for anonymous communication over the internet","author":"shields","year":"2000","journal-title":"ACM CCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293447"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.25"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2010.20"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"2","first-page":"307","article-title":"Webjail: Least-privilege integration of third-party components in web mashups","author":"van acker","year":"0","journal-title":"Annual Computer Security Applications Conference (ACSAC) 2011"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367570"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242655"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"journal-title":"A Middleware Framework for Mashing Device and Telecom Features with the Web","year":"2010","author":"agarwal","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655026"},{"journal-title":"Caja Safe Active Content in Sanitized JavaScript","year":"2008","key":"9"},{"key":"8","article-title":"Comet: Code offload by migrating execution transparently","author":"gordon","year":"0","journal-title":"Proceedings of OSDI 2012"}],"event":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013)","start":{"date-parts":[[2013,7,30]]},"location":"Nassau, Bahamas","end":{"date-parts":[[2013,8,2]]}},"container-title":["2013 22nd International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6603810\/6614072\/06614169.pdf?arnumber=6614169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T21:25:43Z","timestamp":1688592343000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6614169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccn.2013.6614169","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}