{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:49Z","timestamp":1750306309071,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-07-1-0928"],"award-info":[{"award-number":["N00014-07-1-0928"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0831298 and CNS-1319137"],"award-info":[{"award-number":["CNS-0831298 and CNS-1319137"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841124","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"137-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["WebSheets"],"prefix":"10.1145","author":[{"given":"Riccardo","family":"Pelizzi","sequence":"first","affiliation":[{"name":"Stony Brook University"}]},{"given":"R.","family":"Sekar","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. Bricklin. VisiCalc: Information from its creators. http:\/\/www.bricklin.com\/visicalc.htm 2014.  D. Bricklin. VisiCalc: Information from its creators. http:\/\/www.bricklin.com\/visicalc.htm 2014."},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX WebApps","author":"Burket J.","year":"2011","unstructured":"J. Burket , P. Mutchler , M. Weaver , M. Zaveri , and D. Evans . Guardrails: a data-centric web application security framework . In USENIX WebApps , 2011 . J. Burket, P. Mutchler, M. Weaver, M. Zaveri, and D. Evans. Guardrails: a data-centric web application security framework. In USENIX WebApps, 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/130981.130982"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX ATC","author":"Cheng W.","year":"2012","unstructured":"W. Cheng , D. R. Ports , D. A. Schultz , V. Popic , A. Blankstein , J. A. Cowling , D. Curtis , L. Shrira , and B. Liskov . Abstractions for usable information flow control in aeolus . In USENIX ATC , 2012 . W. Cheng, D. R. Ports, D. A. Schultz, V. Popic, A. Blankstein, J. A. Cowling, D. Curtis, L. Shrira, and B. Liskov. Abstractions for usable information flow control in aeolus. In USENIX ATC, 2012."},{"key":"e_1_3_2_1_5_1","volume-title":"Glasgow Workshop on Functional Programming","author":"Clack C.","year":"1997","unstructured":"C. Clack and L. Braine . Object-oriented functional spreadsheets . In Glasgow Workshop on Functional Programming , 1997 . C. Clack and L. Braine. Object-oriented functional spreadsheets. In Glasgow Workshop on Functional Programming, 1997."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796800001404"},{"key":"e_1_3_2_1_7_1","volume-title":"UCS","author":"Forster C. H. Q.","year":"2007","unstructured":"C. H. Q. Forster . Programming through spreadsheets and tabular abstractions. J . UCS , 2007 . C. H. Q. Forster. Programming through spreadsheets and tabular abstractions. J. UCS, 2007."},{"key":"e_1_3_2_1_8_1","volume-title":"OSDI","author":"Giffin D. B.","year":"2012","unstructured":"D. B. Giffin , A. Levy , D. Stefan , D. Terei , D. Mazieres , J. C. Mitchell , and A. Russo . Hails: Protecting data privacy in untrusted web applications . In OSDI , 2012 . D. B. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazieres, J. C. Mitchell, and A. Russo. Hails: Protecting data privacy in untrusted web applications. In OSDI, 2012."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/www.google.com\/sheets\/about\/","author":"Sheets Google","year":"2015","unstructured":"Google. Google Sheets . https:\/\/www.google.com\/sheets\/about\/ , 2015 . Google. Google Sheets. https:\/\/www.google.com\/sheets\/about\/, 2015."},{"key":"e_1_3_2_1_10_1","volume-title":"LISA","author":"Haber E. M.","year":"2005","unstructured":"E. M. Haber , E. Kandogan , A. Cypher , P. P. Maglio , and R. Barrett . A1: Spreadsheet-based scripting for developing web tools . In LISA , 2005 . E. M. Haber, E. Kandogan, A. Cypher, P. P. Maglio, and R. Barrett. A1: Spreadsheet-based scripting for developing web tools. In LISA, 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.19"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2414338.2414372"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/944746.944721"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526824"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502650.1502667"},{"key":"e_1_3_2_1_16_1","volume-title":"Workshop on the Implementation of Functional Languages","author":"Lisper B.","year":"2002","unstructured":"B. Lisper and J. Malmstr\u00f6m . Haxcel: A spreadsheet interface to haskell . In Workshop on the Implementation of Functional Languages , 2002 . B. Lisper and J. Malmstr\u00f6m. Haxcel: A spreadsheet interface to haskell. In Workshop on the Implementation of Functional Languages, 2002."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/products.office.com\/en-US\/","author":"Office","year":"2015","unstructured":"Microsoft. Office 365. https:\/\/products.office.com\/en-US\/ , 2015 . Microsoft. Office 365. https:\/\/products.office.com\/en-US\/, 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"Hewlett-Packard Laboratories","author":"Nardi B. A.","year":"1990","unstructured":"B. A. Nardi and J. R. Miller . The spreadsheet interface: A basis for end user programming . Hewlett-Packard Laboratories , 1990 . B. A. Nardi and J. R. Miller. The spreadsheet interface: A basis for end user programming. Hewlett-Packard Laboratories, 1990."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/287893.287899"},{"key":"e_1_3_2_1_20_1","volume-title":"Enforcing user privacy in web applications using erlang. W2SP","author":"Papagiannis I.","year":"2010","unstructured":"I. Papagiannis , M. Migliavacca , D. M. Eyers , B. Shand , J. Bacon , and P. Pietzuch . Enforcing user privacy in web applications using erlang. W2SP , Oakland, CA , 2010 . I. Papagiannis, M. Migliavacca, D. M. Eyers, B. Shand, J. Bacon, and P. Pietzuch. Enforcing user privacy in web applications using erlang. W2SP, Oakland, CA, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.21"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370847.1370867"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314436.1314443"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796806006186"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCL.1994.288396"}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Twente Netherlands","acronym":"NSPW '15"},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841124"}},"subtitle":["Web Applications for Non-Programmers"],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":26,"alternative-id":["10.1145\/2841113.2841124","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841124","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}