{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:55:36Z","timestamp":1755838536913,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T00:00:00Z","timestamp":1475625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,5]]},"DOI":"10.1145\/2987550.2987571","type":"proceedings-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T12:42:53Z","timestamp":1474461773000},"page":"237-250","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Radiatus"],"prefix":"10.1145","author":[{"given":"Raymond","family":"Cheng","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"William","family":"Scott","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Paul","family":"Ellenbogen","sequence":"additional","affiliation":[{"name":"Princeton"}]},{"given":"Jon","family":"Howell","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Thomas","family":"Anderson","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"320","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Kafka. https:\/\/kafka.apache.org\/  Apache Kafka. https:\/\/kafka.apache.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Web Services. https:\/\/aws.amazon.com  Amazon Web Services. https:\/\/aws.amazon.com"},{"key":"e_1_3_2_1_3_1","unstructured":"Content Security Policy 1.0. http:\/\/www.w3.org\/TR\/CSP\/  Content Security Policy 1.0. http:\/\/www.w3.org\/TR\/CSP\/"},{"key":"e_1_3_2_1_4_1","unstructured":"CWE\/SANS Top 25 Most Dangerous Software Errors. http:\/\/cwe.mitre.org\/top25\/  CWE\/SANS Top 25 Most Dangerous Software Errors. http:\/\/cwe.mitre.org\/top25\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Docker. https:\/\/www.docker.com  Docker. https:\/\/www.docker.com"},{"key":"e_1_3_2_1_6_1","unstructured":"Average selling price of DRAM 1Gb equivalent units from 2009 to 2017. http:\/\/www.statista.com\/statistics\/298821\/dram-average-unit-price\/  Average selling price of DRAM 1Gb equivalent units from 2009 to 2017. http:\/\/www.statista.com\/statistics\/298821\/dram-average-unit-price\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Newsroom. https:\/\/newsroom.fb.com\/company-info\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Firebase. https:\/\/www.firebase.com  Firebase. https:\/\/www.firebase.com"},{"key":"e_1_3_2_1_9_1","unstructured":"Go Language Specification. http:\/\/golang.org\/ref\/spec  Go Language Specification. http:\/\/golang.org\/ref\/spec"},{"key":"e_1_3_2_1_10_1","unstructured":"Google Chrome Multi-process Architecture. http:\/\/blog.chromium.org\/2008\/09\/multi-process-architecture.html  Google Chrome Multi-process Architecture. http:\/\/blog.chromium.org\/2008\/09\/multi-process-architecture.html"},{"key":"e_1_3_2_1_11_1","unstructured":"IE8 and Loosely-Coupled IE (LCIE). http:\/\/blogs.msdn.com\/b\/ie\/archive\/2008\/03\/11\/ie8-and-loosely-coupled-ie-lcie.aspx  IE8 and Loosely-Coupled IE (LCIE). http:\/\/blogs.msdn.com\/b\/ie\/archive\/2008\/03\/11\/ie8-and-loosely-coupled-ie-lcie.aspx"},{"key":"e_1_3_2_1_12_1","unstructured":"Kernel Virtual Machine. http:\/\/www.linux-kvm.org\/page\/Main_Page  Kernel Virtual Machine. http:\/\/www.linux-kvm.org\/page\/Main_Page"},{"key":"e_1_3_2_1_13_1","unstructured":"lmctfy. https:\/\/github.com\/google\/lmctfy  lmctfy. https:\/\/github.com\/google\/lmctfy"},{"key":"e_1_3_2_1_14_1","unstructured":"Node.js. http:\/\/nodejs.org\/  Node.js. http:\/\/nodejs.org\/"},{"key":"e_1_3_2_1_15_1","unstructured":"National Vulnerability Database. https:\/\/nvd.nist.gov\/  National Vulnerability Database. https:\/\/nvd.nist.gov\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Open Container Initiative. http:\/\/www.opencontainers.org\/  Open Container Initiative. http:\/\/www.opencontainers.org\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Open Web Application Security Project. https:\/\/www.owasp.org  Open Web Application Security Project. https:\/\/www.owasp.org"},{"key":"e_1_3_2_1_18_1","unstructured":"Akka Actor Model. http:\/\/akka.io\/  Akka Actor Model. http:\/\/akka.io\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Understanding Service-Oriented Architecture. http:\/\/msdn.microsoft.com\/en-us\/library\/aa480021.aspx  Understanding Service-Oriented Architecture. http:\/\/msdn.microsoft.com\/en-us\/library\/aa480021.aspx"},{"key":"e_1_3_2_1_20_1","unstructured":"RemoteStorage. http:\/\/remotestorage.io\/  RemoteStorage. http:\/\/remotestorage.io\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Linux-VServer. http:\/\/linux-vserver.org\/  Linux-VServer. http:\/\/linux-vserver.org\/"},{"key":"e_1_3_2_1_22_1","unstructured":"Web hacking incident database. http:\/\/projects.webappsec.org\/w\/page\/13246995\/Web-Hacking-Incident-Database  Web hacking incident database. http:\/\/projects.webappsec.org\/w\/page\/13246995\/Web-Hacking-Incident-Database"},{"volume-title":"http:\/\/www.greensql.com\/","year":"2009","key":"e_1_3_2_1_23_1","unstructured":"greensql. http:\/\/www.greensql.com\/ 2009 . greensql. http:\/\/www.greensql.com\/ 2009."},{"volume-title":"http:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/48\/WMF_AR11_SHIP_spreads_15dec11_72dpi.pdf","year":"2011","key":"e_1_3_2_1_24_1","unstructured":"Wikimedia Foundation Annual Report. http:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/48\/WMF_AR11_SHIP_spreads_15dec11_72dpi.pdf 2011 . Wikimedia Foundation Annual Report. http:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/48\/WMF_AR11_SHIP_spreads_15dec11_72dpi.pdf 2011."},{"key":"e_1_3_2_1_25_1","unstructured":"F. Almroth and M. Karlsson. How we got read access on Googles production servers. http:\/\/blog.detectify.com\/post\/82370846588\/  F. Almroth and M. Karlsson. How we got read access on Googles production servers. http:\/\/blog.detectify.com\/post\/82370846588\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.730734"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.27"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866375"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046774"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.16"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2nd USENIX Conference on Web Application Development","author":"Burket J.","year":"2011","unstructured":"J. Burket , P. Mutchler , M. Weaver , M. Zaveri , and D. Evans . GuardRails: A data-centric web application security framework . In Proceedings of the 2nd USENIX Conference on Web Application Development , 2011 . J. Burket, P. Mutchler, M. Weaver, M. Zaveri, and D. Evans. GuardRails: A data-centric web application security framework. In Proceedings of the 2nd USENIX Conference on Web Application Development, 2011."},{"key":"e_1_3_2_1_33_1","volume-title":"Separating web applications from user data storage with bstore","author":"Chandra R.","year":"2010","unstructured":"R. Chandra , P. Gupta , and N. Zeldovich . Separating web applications from user data storage with bstore . 2010 . R. Chandra, P. Gupta, and N. Zeldovich. Separating web applications from user data storage with bstore. 2010."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043567"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522725"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866373"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046734"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062488"},{"key":"e_1_3_2_1_39_1","unstructured":"S. Curtis. Barclays: 97 percent of data breaches still due to SQL injection. http:\/\/news.techworld.com\/security\/3331283\/  S. Curtis. Barclays: 97 percent of data breaches still due to SQL injection. http:\/\/news.techworld.com\/security\/3331283\/"},{"key":"e_1_3_2_1_40_1","volume-title":"2010 USENIX Conference on Web Application Development","author":"Davis B.","year":"2010","unstructured":"B. Davis and H. Chen . Dbtaint: cross-application information flow tracking via databases . In 2010 USENIX Conference on Web Application Development , 2010 . B. Davis and H. Chen. Dbtaint: cross-application information flow tracking via databases. In 2010 USENIX Conference on Web Application Development, 2010."},{"key":"e_1_3_2_1_41_1","first-page":"45","volume":"8","author":"Dixon C.","year":"2008","unstructured":"C. Dixon , T. E. Anderson , and A. Krishnamurthy . Phalanx: Withstanding multimillion-node botnets. In NSDI , volume 8 , pages 45 -- 58 , 2008 . C. Dixon, T. E. Anderson, and A. Krishnamurthy. Phalanx: Withstanding multimillion-node botnets. In NSDI, volume 8, pages 45--58, 2008.","journal-title":"Phalanx: Withstanding multimillion-node botnets. In NSDI"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_43_1","first-page":"143","volume-title":"USENIX Security Symposium","author":"Felmetsger V.","year":"2010","unstructured":"V. Felmetsger , L. Cavedon , C. Kruegel , and G. Vigna . Toward automated detection of logic vulnerabilities in web applications . In USENIX Security Symposium , pages 143 -- 160 , 2010 . V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna. Toward automated detection of logic vulnerabilities in web applications. In USENIX Security Symposium, pages 143--160, 2010."},{"key":"e_1_3_2_1_44_1","first-page":"13","volume-title":"OSDI","author":"Fu K.","year":"2000","unstructured":"K. Fu , M. F. Kaashoek , and D. Mazieres . Fast and secure distributed read-only file system . In OSDI , pages 13 -- 13 . USENIX Association , 2000 . K. Fu, M. F. Kaashoek, and D. Mazieres. Fast and secure distributed read-only file system. In OSDI, pages 13--13. USENIX Association, 2000."},{"key":"e_1_3_2_1_46_1","first-page":"47","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation","author":"Giffin D. B.","year":"2012","unstructured":"D. B. Giffin , A. Levy , D. Stefan , D. Terei , D. Mazi\u00e8res , J. C. Mitchell , and A. Russo . Hails: protecting data privacy in untrusted web applications . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation , pages 47 -- 60 , 2012 . ISBN 978-1-931971-96-6. URL http:\/\/dl.acm.org\/citation.cfm?id=2387880.2387886. D. B. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazi\u00e8res, J. C. Mitchell, and A. Russo. Hails: protecting data privacy in untrusted web applications. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, pages 47--60, 2012. ISBN 978-1-931971-96-6. URL http:\/\/dl.acm.org\/citation.cfm?id=2387880.2387886."},{"key":"e_1_3_2_1_47_1","unstructured":"P. Graham and R. Morris. Arc forum. http:\/\/arclanguage.org\/forum 2008.  P. Graham and R. Morris. Arc forum. http:\/\/arclanguage.org\/forum 2008."},{"key":"e_1_3_2_1_48_1","first-page":"1","volume-title":"HotOS","volume":"7","author":"Howell J.","year":"2007","unstructured":"J. Howell , C. Jackson , H. J. Wang , and X. Fan . MashupOS: Operating system abstractions for client mashups . In HotOS , volume 7 , pages 1 -- 7 , 2007 . J. Howell, C. Jackson, H. J. Wang, and X. Fan. MashupOS: Operating system abstractions for client mashups. In HotOS, volume 7, pages 1--7, 2007."},{"key":"e_1_3_2_1_49_1","volume-title":"NSDI","author":"Howell J.","year":"2013","unstructured":"J. Howell , B. Parno , and J. Douceur . Embassies: Radically refactoring the web . NSDI , 2013 . J. Howell, B. Parno, and J. Douceur. Embassies: Radically refactoring the web. NSDI, 2013."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Ingram L.","year":"2012","unstructured":"L. Ingram and M. Walfish . Tingram2012treehousoreehouse: Javascript sandboxes to help web developers help themselves . In Proceedings of the USENIX Annual Technical Conference , 2012 . L. Ingram and M. Walfish. Tingram2012treehousoreehouse: Javascript sandboxes to help web developers help themselves. In Proceedings of the USENIX Annual Technical Conference, 2012."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2387880.2387899"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294293"},{"key":"e_1_3_2_1_54_1","first-page":"185","volume-title":"USENIX Annual Technical Conference, General Track","author":"Krohn M. N.","year":"2004","unstructured":"M. N. Krohn . Building secure high-performance web services with OKWS . In USENIX Annual Technical Conference, General Track , pages 185 -- 198 , 2004 . M. N. Krohn. Building secure high-performance web services with OKWS. In USENIX Annual Technical Conference, General Track, pages 185--198, 2004."},{"key":"e_1_3_2_1_55_1","first-page":"501","volume-title":"NSDI","author":"Lee S.","year":"2013","unstructured":"S. Lee , E. L. Wong , D. Goel , M. Dahlin , and V. Shmatikov . &pi;box: A platform for privacy-preserving apps . In NSDI , pages 501 -- 514 , 2013 . S. Lee, E. L. Wong, D. Goel, M. Dahlin, and V. Shmatikov. &pi;box: A platform for privacy-preserving apps. In NSDI, pages 501--514, 2013."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062487"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043577"},{"key":"e_1_3_2_1_59_1","first-page":"1","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, number 3","author":"Moshchuk A.","year":"2007","unstructured":"A. Moshchuk , T. Bragin , D. Deville , S. D. Gribble , and H. M. Levy . Spyproxy: Execution-based detection of malicious web content . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, number 3 , pages 1 -- 16 . USENIX Association , 2007 . A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy. Spyproxy: Execution-based detection of malicious web content. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, number 3, pages 1--16. USENIX Association, 2007."},{"key":"e_1_3_2_1_60_1","volume-title":"Vulnerability summary for cve-2014-7235. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-7235","author":"National Vulnerability Database.","year":"2014","unstructured":"National Vulnerability Database. Vulnerability summary for cve-2014-7235. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-7235 2014 . National Vulnerability Database. Vulnerability summary for cve-2014-7235. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-7235 2014."},{"key":"e_1_3_2_1_61_1","first-page":"13","volume-title":"2nd USENIX Conference on Web Application Development","author":"Papagiannis I.","year":"2011","unstructured":"I. Papagiannis , M. Migliavacca , and P. Pietzuch . PHP Aspis: using partial taint tracking to protect against injection attacks . In 2nd USENIX Conference on Web Application Development , page 13 , 2011 . I. Papagiannis, M. Migliavacca, and P. Pietzuch. PHP Aspis: using partial taint tracking to protect against injection attacks. In 2nd USENIX Conference on Web Application Development, page 13, 2011."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.21"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_64_1","unstructured":"Ponemon Institute. 2013 Cost of a Data Breach Study: Global Analysis. http:\/\/www.ponemon.org\/  Ponemon Institute. 2013 Cost of a Data Breach Study: Global Analysis. http:\/\/www.ponemon.org\/"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_66_1","volume-title":"USENIX Symposium of Networked Systems Design and Implementation","author":"Popa R. A.","year":"2014","unstructured":"R. A. Popa , E. Stark , J. Helfer , S. Valdez , N. Zeldovich , F. Kaashoek , and H. Balakrishnan . Building web applications on top of encrypted data using Mylar . In USENIX Symposium of Networked Systems Design and Implementation , 2014 . R. A. Popa, E. Stark, J. Helfer, S. Valdez, N. Zeldovich, F. Kaashoek, and H. Balakrishnan. Building web applications on top of encrypted data using Mylar. In USENIX Symposium of Networked Systems Design and Implementation, 2014."},{"key":"e_1_3_2_1_67_1","first-page":"229","volume-title":"LISA","volume":"99","author":"Roesch M.","year":"1999","unstructured":"M. Roesch : Lightweight intrusion detection for networks . In LISA , volume 99 , pages 229 -- 238 , 1999 . M. Roesch et al. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229--238, 1999."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046775"},{"key":"e_1_3_2_1_69_1","volume-title":"Usenix Security","author":"Santos N.","year":"2012","unstructured":"N. Santos , R. Rodrigues , K. P. Gummadi , and S. Saroiu . Policy-sealed data: A new abstraction for building trusted cloud services . In Usenix Security , 2012 . N. Santos, R. Rodrigues, K. P. Gummadi, and S. Saroiu. Policy-sealed data: A new abstraction for building trusted cloud services. In Usenix Security, 2012."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046776"},{"key":"e_1_3_2_1_71_1","volume-title":"USENIX Security Symposium","author":"Sun F.","year":"2011","unstructured":"F. Sun , L. Xu , and Z. Su . Static detection of access control vulnerabilities in web applications . In USENIX Security Symposium , 2011 . F. Sun, L. Xu, and Z. Su. Static detection of access control vulnerabilities in web applications. In USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_72_1","volume-title":"JavaScript in JavaScript (js.js): Sandboxing third-party scripts","author":"Terrace J.","year":"2012","unstructured":"J. Terrace , S. Beard , and N. P. K. Katta . JavaScript in JavaScript (js.js): Sandboxing third-party scripts . 2012 . J. Terrace, S. Beard, and N. P. K. Katta. JavaScript in JavaScript (js.js): Sandboxing third-party scripts. 2012."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658959"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956437"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294263"},{"key":"e_1_3_2_1_76_1","unstructured":"W. Wei. Flickr vulnerable to SQL Injection and Remote Code Execution Flaws. http:\/\/thehackernews.com\/2014\/04\/flickr-vulnerable-to-sql-injection-and.html?m=1  W. Wei. Flickr vulnerable to SQL Injection and Remote Code Execution Flaws. http:\/\/thehackernews.com\/2014\/04\/flickr-vulnerable-to-sql-injection-and.html?m=1"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298481"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866374"}],"event":{"name":"SoCC '16: ACM Symposium on Cloud Computing","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Santa Clara CA USA","acronym":"SoCC '16"},"container-title":["Proceedings of the Seventh ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987550.2987571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987550.2987571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:06Z","timestamp":1750218006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987550.2987571"}},"subtitle":["a Shared-Nothing Server-Side Web Architecture"],"short-title":[],"issued":{"date-parts":[[2016,10,5]]},"references-count":77,"alternative-id":["10.1145\/2987550.2987571","10.1145\/2987550"],"URL":"https:\/\/doi.org\/10.1145\/2987550.2987571","relation":{},"subject":[],"published":{"date-parts":[[2016,10,5]]},"assertion":[{"value":"2016-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}