{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:05:37Z","timestamp":1730282737511,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mipro.2015.7160472","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T18:02:26Z","timestamp":1437069746000},"page":"1279-1283","source":"Crossref","is-referenced-by-count":0,"title":["Disabling same origin policy for automatization of webform data entry"],"prefix":"10.1109","author":[{"given":"Samir","family":"Ribic","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Salihbegovic","sequence":"additional","affiliation":[]},{"given":"Alvin","family":"Huseinovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Cross Site Request Forgery: What Attackers Don't Want You to Know A Study of Browser Implementations and Security Mechanisms for XMLHttpRequest and XdomainRequest","author":"lam","year":"2014","journal-title":"Working Papers in Application Security"},{"journal-title":"Greasemonkey Hacks Tips & Tools for Remixing the Web with Firefox","year":"2005","author":"pilgrim","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1516046.1516066"},{"key":"ref13","first-page":"258","author":"helmke","year":"2012","journal-title":"The Official Ubuntu Book"},{"journal-title":"Automatizovano popunjavanje web formulara zaobila&#x017E;enjem pravila istog izvora","year":"2012","author":"ribi?","key":"ref14"},{"article-title":"The Web Origin Concept","year":"2010","author":"barth","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135884"},{"key":"ref6","first-page":"402","article-title":"JavaScript","author":"flanagan","year":"1997","journal-title":"The Definitive Guide"},{"key":"ref5","first-page":"26","author":"massol","year":"2003","journal-title":"JUnit in Action"},{"journal-title":"Cross-origin Resource Sharing","year":"2010","author":"van kesteren","key":"ref8"},{"key":"ref7","article-title":"The state of the cross-domain nation","author":"lekies","year":"2011","journal-title":"Proceedings of the 5th Workshop on Web 2 0 Security and Privacy W2SP"},{"key":"ref2","article-title":"Mitigation of CSRF Attack","volume":"3","author":"tandel","year":"2014","journal-title":"International Journal of Science and Research (IJSR)"},{"journal-title":"Document Object Model (DOM) Level 3 Core Specification","year":"2001","author":"nicol","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-5981-7_8"}],"event":{"name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2015,5,25]]},"location":"Opatija, Croatia","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153596\/7160221\/07160472.pdf?arnumber=7160472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:59:32Z","timestamp":1490374772000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7160472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/mipro.2015.7160472","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}