{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:30:49Z","timestamp":1769329849109,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,4,10]],"date-time":"2011-04-10T00:00:00Z","timestamp":1302393600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257007"],"award-info":[{"award-number":["257007"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,4,10]]},"DOI":"10.1145\/1972551.1972558","type":"proceedings-article","created":{"date-parts":[[2011,5,3]],"date-time":"2011-05-03T12:48:54Z","timestamp":1304426934000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["An empirical study on the security of cross-domain policies in rich internet applications"],"prefix":"10.1145","author":[{"given":"Georgios","family":"Kontaxis","sequence":"first","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology, Hellas"}]},{"given":"Demetris","family":"Antoniades","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology, Hellas"}]},{"given":"Iasonas","family":"Polakis","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology, Hellas"}]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology, Hellas"}]}],"member":"320","published-online":{"date-parts":[[2011,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adobe Flash Platform Pervasiveness. http:\/\/www.adobe.com\/flashplatform\/statistics\/.  Adobe Flash Platform Pervasiveness. http:\/\/www.adobe.com\/flashplatform\/statistics\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Jeremiah Grossman - crossdomain.xml statistics. http:\/\/jeremiahgrossman.blogspot.com\/2006\/10\/crossdomainxml-statistics.html.  Jeremiah Grossman - crossdomain.xml statistics. http:\/\/jeremiahgrossman.blogspot.com\/2006\/10\/crossdomainxml-statistics.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Rich Internet Application Market Share. http:\/\/www.statowl.com\/custom_ria_market_penetration.php.  Rich Internet Application Market Share. http:\/\/www.statowl.com\/custom_ria_market_penetration.php."},{"key":"e_1_3_2_1_4_1","unstructured":"wikipedia.org - Rich Internet Application. http:\/\/en.wikipedia.org\/wiki\/Rich_Internet_application.  wikipedia.org - Rich Internet Application. http:\/\/en.wikipedia.org\/wiki\/Rich_Internet_application."},{"key":"e_1_3_2_1_5_1","unstructured":"R. Auger. Socket capable browser plugins result in transparent proxy abuse 2010. http:\/\/www.thesecuritypractice.com\/the_security_practice\/TransparentProxyAbuse.pdf.  R. Auger. Socket capable browser plugins result in transparent proxy abuse 2010. http:\/\/www.thesecuritypractice.com\/the_security_practice\/TransparentProxyAbuse.pdf."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 18th Network and Distributed System Security Symposium","author":"Balduzzi M.","year":"2011"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455782"},{"key":"e_1_3_2_1_8_1","unstructured":"L.-S. Huang E. Y. Chen A. Barth E. Rescorla and C. Jackson. Transparent proxies: Threat or menace? http:\/\/www.adambarth.com\/experimental\/websocket.pdf.  L.-S. Huang E. Y. Chen A. Barth E. Rescorla and C. Jackson. Transparent proxies: Threat or menace? http:\/\/www.adambarth.com\/experimental\/websocket.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315298"}],"event":{"name":"EuroSys '11: Sixth EuroSys Conference 2011","location":"Salzburg Austria","acronym":"EuroSys '11","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Fourth European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1972551.1972558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1972551.1972558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:54Z","timestamp":1750244754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1972551.1972558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,10]]},"references-count":9,"alternative-id":["10.1145\/1972551.1972558","10.1145\/1972551"],"URL":"https:\/\/doi.org\/10.1145\/1972551.1972558","relation":{},"subject":[],"published":{"date-parts":[[2011,4,10]]},"assertion":[{"value":"2011-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}