{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:18:08Z","timestamp":1774628288929,"version":"3.50.1"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":34,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2017,4,11]],"date-time":"2017-04-11T00:00:00Z","timestamp":1491868800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DHS","award":["BAA 11-01"],"award-info":[{"award-number":["BAA 11-01"]}]},{"name":"AFRL","award":["FA8750- 12-2-0328"],"award-info":[{"award-number":["FA8750- 12-2-0328"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,11]]},"DOI":"10.1145\/2872427.2882991","type":"proceedings-article","created":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T15:35:52Z","timestamp":1485185752000},"page":"891-901","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["An Empirical Study of Web Cookies"],"prefix":"10.1145","author":[{"given":"Aaron","family":"Cahn","sequence":"first","affiliation":[{"name":"comScore, Madison, WI, USA"}]},{"given":"Scott","family":"Alfeld","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Paul","family":"Barford","sequence":"additional","affiliation":[{"name":"comScore &amp; University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"S.","family":"Muthukrishnan","sequence":"additional","affiliation":[{"name":"Rutgers University &amp; Microsoft India, Brunswick, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"April","author":"Barth A.","year":"2011","unstructured":"A. Barth. RFC 6265: HTTP State Management System, April 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496671.1496681"},{"key":"e_1_3_2_1_3_1","volume-title":"How We Classify Cookies","author":"Collective The Cookie","year":"2013","unstructured":"The Cookie Collective. How We Classify Cookies, 2013. http:\/\/cookiepedia.co.uk\/classify-cookies."},{"key":"e_1_3_2_1_4_1","volume-title":"December","author":"US Federal Trade Commission","year":"2010","unstructured":"US Federal Trade Commission. Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers, December 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2220352.2220353"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_2_1_7_1","volume-title":"Web session security: Attack and defense techniques. Case Studies in Secure Computing: Achievements and Trends, page 389","author":"Evans Zachary","year":"2014","unstructured":"Zachary Evans and Hossain Shahriar. Web session security: Attack and defense techniques. Case Studies in Secure Computing: Achievements and Trends, page 389, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267612.1267631"},{"key":"e_1_3_2_1_9_1","volume-title":"October","author":"Giannandrea John","year":"1994","unstructured":"John Giannandrea and Lou Montulli. Persistent Client State: HTTP Cookies, October 1994."},{"key":"e_1_3_2_1_10_1","volume-title":"A comparison of HTTP and HTTPS performance","author":"Goldberg Arthur","year":"1998","unstructured":"Arthur Goldberg, Robert Buff, and Andrew Schmitt. A comparison of HTTP and HTTPS performance. Computer Measurement Group, CMG98, 1998."},{"key":"e_1_3_2_1_11_1","unstructured":"Ghostery Inc. Ghostery 2014."},{"key":"e_1_3_2_1_12_1","volume-title":"April","author":"Legal Information JISC","year":"2010","unstructured":"JISC Legal Information. EU Cookie Directive - Directive 2009\/136\/EC, April 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_27"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280688"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177088"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397744"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1863190.1863194"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2109"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2965"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517868"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_24_1","unstructured":"Mozilla. Betterprivacy May 2014."},{"key":"e_1_3_2_1_25_1","unstructured":"Lukasz Olejnik Tran Minh-Dung and Claude Castelluccia. Selling Off Privacy at Auction."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228315"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12226-7_7"},{"key":"e_1_3_2_1_28_1","volume-title":"September","author":"Schwartz J.","year":"2001","unstructured":"J. Schwartz. Giving the Web a Memory Cost Its Users Privacy, September 2001."},{"key":"e_1_3_2_1_29_1","volume-title":"Original Nestl\u00e9\u00ae Toll House\u00ae Chocolate Chip Cookies","author":"Produits Nestl\u00e8 Soci\u00e9t\u00e9 Des","year":"2014","unstructured":"Soci\u00e9t\u00e9 Des Produits Nestl\u00e8. Original Nestl\u00e9\u00ae Toll House\u00ae Chocolate Chip Cookies, 2014."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1446862"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541822.1541824"},{"key":"e_1_3_2_1_32_1","volume-title":"Heraklion","author":"Tirtea Rodica","year":"2011","unstructured":"Rodica Tirtea. Bittersweet cookies some security and privacy considerations. Heraklion, 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.006"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of 4th Web, 2","author":"Zhou Yuchen","year":"2010","unstructured":"Yuchen Zhou and David Evans. Why aren't http-only cookies more widely deployed. Proceedings of 4th Web, 2, 2010."}],"event":{"name":"WWW '16: 25th International World Wide Web Conference","location":"Montr\u00e9al Qu\u00e9bec Canada","acronym":"WWW '16","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 25th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872427.2882991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872427.2882991","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872427.2882991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:29:12Z","timestamp":1763458152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872427.2882991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,11]]},"references-count":34,"alternative-id":["10.1145\/2872427.2882991","10.5555\/2872427"],"URL":"https:\/\/doi.org\/10.1145\/2872427.2882991","relation":{},"subject":[],"published":{"date-parts":[[2016,4,11]]},"assertion":[{"value":"2016-04-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}