{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:11Z","timestamp":1750307411729,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,26]],"date-time":"2010-04-26T00:00:00Z","timestamp":1272240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,26]]},"DOI":"10.1145\/1772690.1772764","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"721-730","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Object views"],"prefix":"10.1145","author":[{"given":"Leo A.","family":"Meyerovich","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Adrienne Porter","family":"Felt","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Mark S.","family":"Miller","sequence":"additional","affiliation":[{"name":"Google Inc, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/wiki.developers.facebook.com\/index.php\/FBJS\/","author":"Facebok Developers Wiki FBJS","year":"2008","unstructured":"FBJS - Facebok Developers Wiki . http:\/\/wiki.developers.facebook.com\/index.php\/FBJS\/ , 2008 . FBJS - Facebok Developers Wiki. http:\/\/wiki.developers.facebook.com\/index.php\/FBJS\/, 2008."},{"key":"e_1_3_2_1_2_1","volume-title":"Web 2.0 Security and Privacy","author":"Barth A.","year":"2009","unstructured":"A. Barth , C. Jackson , and W. Li . Attacks on JavaScript Mashup Communication . In Web 2.0 Security and Privacy , 2009 . A. Barth, C. Jackson, and W. Li. Attacks on JavaScript Mashup Communication. In Web 2.0 Security and Privacy, 2009."},{"key":"e_1_3_2_1_3_1","volume-title":"The Security Architecture of the Chromium Browser. Technical report","author":"Barth A.","year":"2008","unstructured":"A. Barth , C. Jackson , C. Reis , and The Google Chrome Team . The Security Architecture of the Chromium Browser. Technical report , Google Inc ., 2008 . A. Barth, C. Jackson, C. Reis, and The Google Chrome Team. The Security Architecture of the Chromium Browser. Technical report, Google Inc., 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455784"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111071"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/145055.145079"},{"key":"e_1_3_2_1_7_1","unstructured":"ECMAScript Wiki. weak references. http:\/\/wiki.ecmascript.org\/doku.php?id=strawman:weak_references.  ECMAScript Wiki. weak references. http:\/\/wiki.ecmascript.org\/doku.php?id=strawman:weak_references."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"End-to-End Web Application Security. In 11th USENIX Workshop on Hot Topics in Operating Systems","author":"Erlingsson U.","year":"2007","unstructured":"U. Erlingsson , B. Livshits , and Y. Xie . End-to-End Web Application Security. In 11th USENIX Workshop on Hot Topics in Operating Systems , pages 1 -- 6 , Berkeley, CA, USA , 2007 . USENIX Association. U. Erlingsson, B. Livshits, and Y. Xie. End-to-End Web Application Security. In 11th USENIX Workshop on Hot Topics in Operating Systems, pages 1--6, Berkeley, CA, USA, 2007. USENIX Association."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.25"},{"key":"e_1_3_2_1_10_1","unstructured":"A. Gavrilov. Balls animation test. http:\/\/bubblemark\/ 2007.  A. Gavrilov. Balls animation test. http:\/\/bubblemark\/ 2007."},{"key":"e_1_3_2_1_11_1","volume-title":"Composable Views","author":"Greenberg M.","year":"2007","unstructured":"M. Greenberg and S. Krishnamurthi . Declarative , Composable Views , May 2007 . Undergraduate Thesis. M. Greenberg and S. Krishnamurthi. Declarative, Composable Views, May 2007. Undergraduate Thesis."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.19"},{"key":"e_1_3_2_1_13_1","volume-title":"Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. In USENIX Security Symposium","author":"Guarnieri S.","year":"2009","unstructured":"S. Guarnieri and B. Livshits . Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. In USENIX Security Symposium , Aug. 2009 . S. Guarnieri and B. Livshits. Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. In USENIX Security Symposium, Aug. 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526785"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297081.1297089"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"MashupOS: Operating System Abstractions for Client Mashups. In 11th USENIX Workshop on Hot Topics in Operating Systems","author":"Howell J.","year":"2007","unstructured":"J. Howell , C. Jackson , H. J. Wang , and X. Fan . MashupOS: Operating System Abstractions for Client Mashups. In 11th USENIX Workshop on Hot Topics in Operating Systems , pages 1 -- 7 , Berkeley, CA, USA , 2007 . USENIX Association. J. Howell, C. Jackson, H. J. Wang, and X. Fan. MashupOS: Operating System Abstractions for Client Mashups. In 11th USENIX Workshop on Hot Topics in Operating Systems, pages 1--7, Berkeley, CA, USA, 2007. USENIX Association."},{"key":"e_1_3_2_1_17_1","unstructured":"S. Isaacs and D. Manolescu. WebSandbox - Microsoft Live Labs. http:\/\/websandbox.livelabs.com\/ 2009.  S. Isaacs and D. Manolescu. WebSandbox - Microsoft Live Labs. http:\/\/websandbox.livelabs.com\/ 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242654"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/242224.242420"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89330-1_23"},{"key":"e_1_3_2_1_23_1","unstructured":"M. S. Miller. Issue 1065: Security hole: Dangerous constructors still leaking. http:\/\/code.google.com\/p\/google-caja\/issues\/detail?id=1065 July 2009.  M. S. Miller. Issue 1065: Security hole: Dangerous constructors still leaking. http:\/\/code.google.com\/p\/google-caja\/issues\/detail?id=1065 July 2009."},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"2nd USENIX Workshop on Hot topics in Security","author":"Miller M. S.","year":"2007","unstructured":"M. S. Miller , J. E. Donnelley , and A. H. Karp . Delegating Responsibility in Digital Systems: Horton's \"who done it? \". In 2nd USENIX Workshop on Hot topics in Security , pages 1 -- 5 , Berkeley, CA, USA , 2007 . USENIX Association. M. S. Miller, J. E. Donnelley, and A. H. Karp. Delegating Responsibility in Digital Systems: Horton's \"who done it?\". In 2nd USENIX Workshop on Hot topics in Security, pages 1--5, Berkeley, CA, USA, 2007. USENIX Association."},{"key":"e_1_3_2_1_25_1","unstructured":"M. S. Miller M. Samuel B. Laurie I. Awad and M. Stay. Caja - Safe Active Content in Sanitized JavaScript. http:\/\/google-caja.googlecode.com\/files\/caja-spec-2007-10-11.pdf October 2007.  M. S. Miller M. Samuel B. Laurie I. Awad and M. Stay. Caja - Safe Active Content in Sanitized JavaScript. http:\/\/google-caja.googlecode.com\/files\/caja-spec-2007-10-11.pdf October 2007."},{"key":"e_1_3_2_1_26_1","unstructured":"N. Mix. Narrative JavaScript. http:\/\/www.neilmix.com\/narrativejs\/doc\/.  N. Mix. Narrative JavaScript. http:\/\/www.neilmix.com\/narrativejs\/doc\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533067"},{"key":"e_1_3_2_1_30_1","volume-title":"E Fundamentals... with Donuts. https:\/\/www.cypherpunks.to\/erights\/talks\/efun\/pingSealer.ppt","author":"Stieglar M.","year":"2004","unstructured":"M. Stieglar . E Fundamentals... with Donuts. https:\/\/www.cypherpunks.to\/erights\/talks\/efun\/pingSealer.ppt , 2004 . M. Stieglar. E Fundamentals... with Donuts. https:\/\/www.cypherpunks.to\/erights\/talks\/efun\/pingSealer.ppt, 2004."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1509276.1509285"}],"event":{"name":"WWW '10: The 19th International World Wide Web Conference","acronym":"WWW '10","location":"Raleigh North Carolina USA"},"container-title":["Proceedings of the 19th international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772690.1772764","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1772690.1772764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:34Z","timestamp":1750246774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772690.1772764"}},"subtitle":["fine-grained sharing in browsers"],"short-title":[],"issued":{"date-parts":[[2010,4,26]]},"references-count":27,"alternative-id":["10.1145\/1772690.1772764","10.1145\/1772690"],"URL":"https:\/\/doi.org\/10.1145\/1772690.1772764","relation":{},"subject":[],"published":{"date-parts":[[2010,4,26]]},"assertion":[{"value":"2010-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}