{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:53Z","timestamp":1750306673221,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T00:00:00Z","timestamp":1406505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,28]]},"DOI":"10.1145\/2637113.2637120","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"66-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Monitoring Reactive Systems with Dynamic Channels"],"prefix":"10.1145","author":[{"given":"Dante","family":"Zanarini","sequence":"first","affiliation":[{"name":"CIFASIS - CONICET, Universidad Nacional de Rosario"}]},{"given":"Mauro","family":"Jaskelioff","sequence":"additional","affiliation":[{"name":"CIFASIS - CONICET, Universidad Nacional de Rosario"}]}],"member":"320","published-online":{"date-parts":[[2014,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.22"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_22"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554353"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814217.1814220"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30793-5_12"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059965"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653673"},{"key":"e_1_3_2_1_8_1","first-page":"w3","article-title":"Document Object Model (DOM) Level 1. W3C recommendation","author":"Byrne S. B.","year":"1998","unstructured":"S. B. Byrne , R. S. Sutor , J. Robie , G. Nicol , M. Champion , S. Isaacson , I. Jacobs , L. Wood , C. Wilson , and A. L. Hors . Document Object Model (DOM) Level 1. W3C recommendation , W3C , Oct. 1998 . http:\/\/www. w3 .org\/TR\/1998\/REC-DOM-Level-1-19981001. S. B. Byrne, R. S. Sutor, J. Robie, G. Nicol, M. Champion, S. Isaacson, I. Jacobs, L. Wood, C. Wilson, and A. L. Hors. Document Object Model (DOM) Level 1. W3C recommendation, W3C, Oct. 1998. http:\/\/www.w3.org\/TR\/1998\/REC-DOM-Level-1-19981001.","journal-title":"W3C"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.50"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1032297.1032305"},{"key":"e_1_3_2_1_11_1","volume-title":"Workshop de Seguridad Inform\u00e1tica WSEGI 2009","author":"Cristi\u00e1 M.","year":"2009","unstructured":"M. Cristi\u00e1 and P. Mata . Runtime Enforcement of Noninterference by Duplicating Processes and their Memories . In Workshop de Seguridad Inform\u00e1tica WSEGI 2009 , Argentina, 38 JAIIO , 2009 . M. Cristi\u00e1 and P. Mata. Runtime Enforcement of Noninterference by Duplicating Processes and their Memories. In Workshop de Seguridad Inform\u00e1tica WSEGI 2009, Argentina, 38 JAIIO, 2009."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699784.2699786"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111596.1111601"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647850.737221"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.19"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135884"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866339"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29709-0_16"},{"key":"e_1_3_2_1_22_1","author":"Ligatti J.","year":"2005","unstructured":"J. Ligatti , L. Bauer , and D. Walker . Edit Automata: Enforcement Mechanisms for Run-time Security Policies. International Journal of Information Security , Feb. 2005 . J. Ligatti, L. Bauer, and D. Walker. Edit Automata: Enforcement Mechanisms for Run-time Security Policies. International Journal of Information Security, Feb. 2005.","journal-title":"Edit Automata: Enforcement Mechanisms for Run-time Security Policies. International Journal of Information Security"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 19th USENIX conference on Security, USENIX Security'10","author":"Louw M. T.","year":"2010","unstructured":"M. T. Louw , K. T. Ganesh , and V. N. Venkatakrishnan . AdJail: practical enforcement of confidentiality and integrity policies on web advertisements . In Proceedings of the 19th USENIX conference on Security, USENIX Security'10 , Berkeley, CA, USA , 2010 . USENIX Association. M. T. Louw, K. T. Ganesh, and V. N. Venkatakrishnan. AdJail: practical enforcement of confidentiality and integrity policies on web advertisements. In Proceedings of the 19th USENIX conference on Security, USENIX Security'10, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755691"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884224"},{"key":"e_1_3_2_1_26_1","volume-title":"July","author":"Myers A. C.","year":"2001","unstructured":"A. C. Myers , L. Zheng , S. Zdancewic , S. Chong , and N. Nystrom . Jif: Java Information Flow. Software release. Located at http:\/\/www.cs.cornell.edu\/jif , July 2001 . A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java Information Flow. Software release. Located at http:\/\/www.cs.cornell.edu\/jif, July 2001."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2166956.2166960"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.10"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.16"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11486-1_30"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034675.2034688"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1291201.1291206"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. Network and Distributed System Security Symposium","author":"Vogt P.","year":"2007","unstructured":"P. Vogt , F. Nentwich , N. Jovanovic , E. Kirda , C. Kruegel , and G. Vigna . Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis . In Proc. Network and Distributed System Security Symposium , Feb. 2007 . P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proc. Network and Distributed System Security Symposium, Feb. 2007."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_37_1","first-page":"10","author":"Wichers D.","year":"2010","unstructured":"Williams and D. Wichers . OWASP Top 10 2010 . http:\/\/www.owasp.org\/index.php\/Top\\_10\\_2010, 2010. Williams and D. Wichers. OWASP Top 10 2010. http:\/\/www.owasp.org\/index.php\/Top\\_10\\_2010, 2010.","journal-title":"OWASP Top"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637113.2637120"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.9"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24098-5_3"}],"event":{"name":"ECOOP '14: European Conference on Object-Oriented Programming","sponsor":["Uppsala University, Department of Information Science Uppsala University, Department of Information Science","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","AITO Assoc Internationale por les Technologies Objects"],"location":"Uppsala Sweden","acronym":"ECOOP '14"},"container-title":["Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637113.2637120","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2637113.2637120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:55Z","timestamp":1750230055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637113.2637120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,28]]},"references-count":40,"alternative-id":["10.1145\/2637113.2637120","10.1145\/2637113"],"URL":"https:\/\/doi.org\/10.1145\/2637113.2637120","relation":{},"subject":[],"published":{"date-parts":[[2014,7,28]]},"assertion":[{"value":"2014-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}